UBM: TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:






VULNERABLE by Design: why destructive exploits keep on coming

by enSiloJul 15, 2016

What happens when a threat actor leverages the actual functionality of an Operating System (OS) or an application and uses it against itself? This is where design vulnerabilities come in. In this paper, we review how threat actors bypass OS fortifications such as access controls, sandboxes and space randomization simply by abusing intentional OS functionality. Unfortunately, design vulnerabilities not restricted just to Windows but also to Linux and Mac OS X.


Keeping Financial Institutions Operating

by enSiloJul 15, 2016

When dealing with money, every moment counts. Any delays in trades, transfers, loan closures, etc. can have serious consequences (and costs) for both customers and the financial institutions they have trusted to execute those transactions. For example, brokerage firms can be found liable if they don't execute orders within contractual timeframes. learn how enSilo gives financial institutions peace of mind.


Healthcare - A Cyberattack Target That's Only Getting Bigger

by enSiloJul 15, 2016

Healthcare organizations have long been the target of cyberattacks, due to the high-value personal information they collect and use during the course of their business. enSilo ensures healthcare organizations can effectively protect the privacy and integrity of the sensitive data in their environment and prevent any unauthorized use or exfiltration.


Password Management Evaluation Guide for Businesses

by Keeper SecurityJul 12, 2016

Passwords - and the need for effective password management - are at the heart of the rise in costly data breaches.

Various evolving business challenges complicate password management by increasing exposure to hacking and phishing attacks, or complicating protective measures. To help businesses address these challenges, various password management solutions are entering the marketplace, each with different capabilities.

This white paper provides a guide for evaluating


The 2016 State of SMB Cybersecurity Research Report

by Keeper SecurityJul 12, 2016

Ponemon Institute and Keeper Security surveyed 600 IT leaders at small and medium sized businesses. The results are clear: no business is immune to cyber attack or data breach.

In fact, only 14 percent of the companies represented in this study rate their ability to mitigate cyber risks, vulnerabilities and attacks as highly effective.

By downloading this report, you'll get access to exclusive research on the 2016 state of SMB cybersecurity and get the insights you need


Application Defense in Depth: Making your Applications First Class Citizens

by IMMUNIOJul 12, 2016

It is easier and easier these days to make applications for the web, and businesses are using them at ever increasing rates. But not everyone--including developers and those who must defend their systems--knows how to secure them properly. Because of the interconnection of most web applications and IT systems, this lack of knowledge exposes enterprises to security risks from hackers who know how to exploit vulnerabilities to gain access to systems, software, and sensitive data.

With


Account Takeover: How Hacking Happens in 2016

by IMMUNIOJul 12, 2016

Hacking happens...

Even the best websites get hacked. As the technology for securing websites and applications is constantly improving, hackers get more creative and aggressive in finding ways to breach.

Hackers generally use one of two main ways to get access to your site: they either look for a technical vulnerability to exploit, like a bug in the code, or they get the credentials of someone with access. Taking advantage of code vulnerabilities takes specialized


Real-Time Web Application Security

by IMMUNIOJul 12, 2016

This paper reviews the current threat landscape for web applications and the approaches available to organizations to secure those applications. It takes a look at one of the most common approaches - Web Application Firewalls (WAFs) - and compares it with the most recent addition to the application protection arsenal, Run-Time Application Self-Protection (RASP). Finally, it takes a deeper dive into the IMMUNIO RASP solution, and concludes with some hints and tips on how to determine what


Conversational User Behavior Analytics

by VeriatoApr 05, 2016

For years, cyber security has focused its resources on stopping the intrusive attack from without. But very little has been done to stop attacks perpetrated from within the system.


Understanding Evasive Protocols and the Role They Play in Cybersecurity

by ibossJul 07, 2016

Threats that hide in high ports and streaming network traffic aren't being detected or stopped by standard cybersecurity solutions. Learn how evasive protocols such as TOR operate, and why most standard solutions are failing to contain them. This eBook also discusses the security approaches that are proving to be the most effective and why.


SUBTOPICS:

enSilo

enSilo delivers a real-time data protection platform against advanced attacks by blocking in real-time any data-related malicious activity. enSilo's platform provides full forensics leading to the violation as well as remediation. With enSilo, organizations can continue running their businesses operations securely and without interruption, even during the investigation and remediation of attacks. enSilo is financially-backed by Lightspeed Venture Partners and Carmel Ventures.


iboss

Since its inception, iboss has challenged the status quo in enterprise security, launching innovative, patented technology delivered direct-to-cloud via proprietary node-based cloud container architecture. iboss advanced threat defense features gives security professionals visibility into previously hidden communication channels, and the security tools needed to close the critical data protection gap that can leave even the largest networks vulnerable.


IMMUNIO

IMMUNIO is a pioneer in real-time web application security (RASP), providing automatic detection and protection against application security vulnerabilities. The company's mission is to make truly effective real-time web protection technology easily available and widely deployed, and by doing so, stop the biggest source of breached data records.


Keeper Security

Keeper Security is transforming the way businesses and individuals protect their passwords and sensitive digital assets to significantly reduce cyber theft. As the leading password manager and digital vault, Keeper helps millions of people and thousands of businesses substantially mitigate the risk of a data breach. Keeper is SOC 2 Certified and utilizes best-in-class encryption to safeguard its customers. Keeper protects industry-leading companies including Sony, Chipotle, and The University of Alabama at Birmingham.


Veriato

Veriato develops intelligent, powerful solutions that provide companies with visibility into, and understanding of, the human behaviors and activities occurring within their firewall, making them more secure and productive. We provide world-class software and support that enables our customers to protect their most valuable assets, reduce their risk, and gain unparalleled visibility into their operations.