TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:






The Threats From Within

by Kaspersky LabNov 17, 2016

Your employees are your most valuable asset. But they can also be the weakest link in your security chain.

According to Kaspersky Lab research, 73% of organizations had an internal security incident in 2015. Whether accidental or intentional, employees often cause internal data breach issues that can severely compromise your business.

Download our eBook, The Threats from Withinz; How Educating Your Employees on Cybersecurity Can Protect Your Company, to access invaluable


Ransomware: All Locked Up And No Place To Go

by Kaspersky LabNov 17, 2016

News stories about ransomware are becoming a daily event. Hospitals, government agencies and individuals have all been hit by this growing menace, and the threat is only going to grow. As cybercriminals learn just how effective this method of extortion is, Kaspersky Lab experts predict that ransomware attacks will become increasingly targeted at organizations most likely to pay.

But there is hope. By learning the tactics behind ransomware, you can stop an attack from happening in the


Healthcare Ransomware: Hospitals On Hold

by Kaspersky LabNov 17, 2016

Hospital operations coming to a grinding halt. Patients being admitted by handwritten records. And a mysterious message explaining that the only way to get things back up and running is to pay a ransom. It's a scenario that is all too familiar to many hospitals around the country, and it's only getting worse as cybercriminals realize how easily they can penetrate the weak security at many hospitals.

How does a healthcare organization protect itself and keep operations running


The Dangers Of Phishing: Help Employees Avoid The Lure Of Cybercrime

by Kaspersky LabNov 17, 2016

Phishing, which targets employees through fraudulent emails with the intent of getting at sensitive corporate data, is one of the biggest threats to corporate IT security. In fact, Kaspersky Lab's own research shows that in the aftermath of a phishing attack, professional services are usually required to restore normal service, leading to costly budget overruns.Phishing, which targets employees through fraudulent emails with the intent of getting at sensitive corporate data, is one of the


Cybercriminals: Unmasking The Villain

by Kaspersky LabNov 17, 2016

With all of the overwhelming statistics on cybercrime, it can be easy to forget that there are actual people behind these facts and figures.

Have you ever wondered who they are? What countries they come from? Who are their top targets?

As a leader in cybercrime analysis, Kaspersky Lab's GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the


Shooting the Messenger: Understanding the Threats to the Media and Broadcasting Industry

by Digital ShadowsNov 16, 2016

Amid all of the noise, it's often tricky for organizations to identify and prioritize the threats they face online. Organizations in the media and broadcasting industry are no exception.

This paper explores:
- Trends in the threats seen in 2016 for broadcasting and media organizations
- The steps that can be taken to prevent and mitigate potential threats


Ransomware is Increasing the Risks & Impact to Organizations

by mimecastNov 12, 2016

Cybercriminals constantly engage organizations in a game of leapfrog: system defenses improve, so malware searches for new holes. Recently ransomware has been gaining momentum.

Learn about this threat, its impact and ways to avoid attacks.


Top 5 SIEM challenges for the midmarket

by Arctic Wolf NetworksNov 10, 2016

Security Information and Event Management (SIEM) is a great tool that can protect your organization, when implemented well. SIEM is believed to be a core foundation to build a Security Operation Center (SOC). Its popularity is despite the fact that there are no major regulations suggesting to use SIEM.

However, SIEM is like a bike that needs constant pedaling while looking out for traffic and people. In fact, it is an uphill biking that stops when you stop pedaling. Security is a


Defend against injection attacks

by Rogue Wave SoftwareNov 09, 2016

As our reliability on software grows each day, it becomes imperative that we implement software in the most secure manner possible.

In this white paper we'll explore the risk of injection attacks, how to prevent these vulnerabilities in your software, and how static code analysis can help.


Static code analysis in an Agile world

by Rogue Wave SoftwareAug 26, 2015

To keep pace with ever-increasing customer demands on software functionality and time-to-market expectations, software developers are having to develop higher quality code faster.

As a result, Agile development is becoming more common. However, to fully realize the benefits of Agile, a repeatable process for ensuring code is free of defects and security vulnerabilities is critical. This paper examines how source code analysis can enhance the Agile development process and empower Agile


SUBTOPICS:

Arctic Wolf Networks

Headquarters: 111 W. Evelyn Ave, Suite 115, Sunnyvale 94086

Arctic Wolf Networks provides SOC as a service that makes every link in the security chain stronger. Customer-dedicated security engineers anchor the service, act as the stewards of log data, and are focused on reviewing events, identifying incidents, and eliminating false positives.


Digital Shadows

Digital Shadows provides cyber situational awareness to help organizations protect against cyber attacks, loss of intellectual property, and loss of brand and reputational integrity. We are jointly headquartered in London and San Francisco. Digital Shadows helps large multi-national organizations in sectors including finance, retail, pharmaceuticals and oil and gas. Our flagship solution, Digital Shadows SearchLight,is a scalable and easy-to-use data analysis platform that provides a complete view of an organization's digital footprint and the profile of its attackers. SearchLight is complemented with support from our world-class intelligence operations team to ensure extensive coverage, tailored intelligence and frictionless deployment. Digital Shadows helps our customers see their organizations through an "attacker's eye view" and keep their assets and reputation intact.


mimecast

Mimecast (www.mimecast.com) delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate and fragmented email environments into one holistic solution that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email. Founded in the United Kingdom in 2003, Mimecast serves more than 6,000 customers worldwide and has offices in Europe, North America, Africa and the Channel Islands.


Rogue Wave Software

Rogue Wave Software, Inc. is the leading provider of enterprise class C++ components and infrastructure that enable organizations to build and deploy high performance applications. Only Rogue Wave provides the most complete C++ technology stack including C++ components, UI components, run-time infrastructure, and services. Today, thousands of organizations worldwide have chosen Rogue Wave.