Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

incidents

Results 1 - 25 of 159Sort Results By: Published Date | Title | Company Name
Published By: Infinidat EMEA     Published Date: May 14, 2019
Continuous data availability is a key business continuity requirement for storage systems. It ensures protection against downtime in case of serious incidents or disasters and enables recovery to an operational state within a reasonably short period. To ensure continuous availability, storage solutions need to meet resiliency, recovery, and contingency requirements outlined by the organization.
Tags : 
    
Infinidat EMEA
Published By: Alert Logic     Published Date: Oct 25, 2019
SMB Threatscape 2019 Cybercriminals are increasingly targeting small and mid-sized businesses with limited budgets and staff constraints. Get the nine key insights that can help keep you secure. Read the findings from our analysis of 1.3 petabytes of data, 8.2 million verified incidents, and over 10.2 trillion log messages across 4,000+ organizations.
Tags : 
    
Alert Logic
Published By: Avetta     Published Date: Sep 17, 2019
With companies and executives being held accountable for incidents in the workplace, the issue of workers’ health and safety has become a persistent concern for organizations around the world. And with varying standards across borders, confusion about what companies need to do is rampant. This need for an international consensus standard on workplace health and safety prompted the proposal of ISO 45001 in 2013. The standard, passed in March 2018, now serves as the international guide on occupational health and safety (OH&S) and outlines relevant methods and benchmarks. With insight from expert leadership, this whitepaper gives you the complete guide on how to work with the new standard. You'll learn: • Why ISO 45001 matters and its impact upon your business • The benefits and pathway to becoming certified • Important considerations for the contractor selection process
Tags : 
    
Avetta
Published By: Avetta     Published Date: Sep 17, 2019
In the beginning of 2019, a National Safety Council (NSC) study revealed that for the first time in US recorded history, the odds of dying from an opioid overdose (1:96) surpassed those of dying in an auto accident (1:103). As a result, opioid overdoses are now the number one cause of preventable injury deaths in the United States. The growing trend of opioid-related workplace incidents is a major concern for supply chains across the world. In fact, a recent study by Massachusetts Department of Public Health shows higher opioid overdose incidents occurring in industries that have a higher chance of worker-related injury. Among these, construction and manufacturing are the two industries most heavily affected. This whitepaper discusses tips for dealing with the opioid epidemic and gives clarity around OSHA drug testing regulations.
Tags : 
    
Avetta
Published By: Resolver     Published Date: Nov 01, 2019
Based on what Resolver has learned by working with hundreds of security leaders, they’ve found there isn’t a one size fits all model for creating workflows that effectively responds to every security incident. Even within an organization, not every incident will be able to go through the same process. That’s why they’ve developed an incident workflow template for your corporate security team. This a great framework to get you thinking about the various stages that could be involved in a single incident. Download this resource to uncover: - Best practices on how to keep incident submission simple to ensure adoption across the organization - Important factors to consider for the portal and triage step of incident submission - How to include notification and task assignment to your incident workflow - A sample list of key metrics used by industry-leading security professionals - Plus! Get a free printable incident workflow template that you can use with your team
Tags : 
    
Resolver
Published By: Resolver     Published Date: Nov 01, 2019
Together with ASIS International, Resolver polled corporate security professionals in the ASIS community about the state of security management in 2019. Based on the results, Resolver examined current practices and trends in the systems and technologies involved with managing incidents and assessing threats. Watch this webinar for access to the survey results where Resolver identified the top incidents organizations face, where security teams are planning technology improvements or upgrades, and how they use incident management to assess future threats. You’ll walk away with the information you need to benchmark your team, as well as practical tactics to collect relevant data to help allocate and maximize your security budget for 2020.
Tags : 
    
Resolver
Published By: Menlo Security     Published Date: Nov 11, 2019
"The “detect and prevent” approach has reached its potential, and attackers have learned how to bypass this defense method. Verizon reports that 2018 was a record year, with 41,686 reported security incidents and 2,013 confirmed cybersecurity breaches. What’s more appalling is that studies have shown that 68 percent of breaches take months or longer to detect. Menlo Security’s Internet Isolation Platform enables the Zero Trust Internet, which takes the guesswork out of security by assuming that all Internet content and websites are malicious. Learn: - How companies are able to separate their enterprise network from the public web while still allowing employees to have seamless access to the Internet. - How you can warn employees that they are on a phishing site when they’ve fallen for a real phishing attack. - How you never have to worry about malware, viruses, or ransomware being downloaded."
Tags : 
    
Menlo Security
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
    
Ounce Labs, an IBM Company
Published By: HERE Technologies     Published Date: Jan 22, 2019
Rising urbanization has brought unprecedented levels of traffic and congestion to our major towns and cities. Departments of transport are battling to ensure their regions aren’t negatively impacted by increased pressure on their road networks. On the frontline are traffic operators and planners. Every day, they face complex challenges as they attempt to improve traffic flow, minimize incidents, and unearth solutions to network issues. This eBook explains how traffic planners and operators can use data to help overcome some of the challenges they face.
Tags : 
public sector, urbanization, traffic management
    
HERE Technologies
Published By: Cisco EMEA     Published Date: Mar 05, 2018
The operation of your organization depends, at least in part, on its data. You can avoid fines and remediation costs, protect your organization’s reputation and employee morale, and maintain business continuity by building a capability to detect and respond to incidents effectively. The simplicity of the incident response process can be misleading. We recommend tabletop exercises as an important step in pressure-testing your program.
Tags : 
human resources, cisco, employees, data, analysis
    
Cisco EMEA
Published By: Intel Corp.     Published Date: May 15, 2018
Intel's factories rely on thousands of PCs for manufacturing automation; keeping these PCs up and running can prevent expensive downtime. To manage these systems, Intel IT is using the Intel vPro platform's hardware- based feature, Intel Active Management Technology (Intel AMT), to help reduce production downtime caused by PC incidents by 87.5 percent.
Tags : 
    
Intel Corp.
Published By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
    
Cisco EMEA
Published By: CrowdStrike     Published Date: Oct 23, 2017
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs How the CrowdStrike® EDR solution empowers organ
Tags : 
    
CrowdStrike
Published By: Dell EMC EMEA     Published Date: Nov 23, 2018
Companies Prioritize Detection Amidst A Wave Of Security Incidents Advanced endpoint threats and steady attacks change the way that decision-makers at organizations of all sizes and across industries prioritize, purchase, and execute on security initiatives. Now more than ever, IT security professionals recognize the importance of front line detection and are shifting priorities to close gaps that place their organizations at risk. Learn more about Dell solutions powered by Intel®
Tags : 
    
Dell EMC EMEA
Published By: Limelight Network     Published Date: Aug 12, 2019
Cyber-criminals are increasingly sophisticated and targeted in their attacks. If you are in charge of ensuring the security of your company’s website, it has not been easy going as these notable security incidents reveal: • Sabre Systems—The reservation software company had data from Hard Rock Hotels, Google, Loews, and others, stolen as a result of the breach1. • CIA—WikiLeaks obtained and published documents detailing the intelligence agency’s hacking efforts1. • Virgin America—Thousands of employees and contractors had their login information compromised1. • Equifax—The credit rating agency had a breach into highly sensitive personal information of 143 million U.S. consumers1. • Universities and Federal Agencies—More than 60 universities and US federal organizations were compromised with SQL injections1. There are numerous lessons to be learned from these breaches. Despite the growing stream of news stories about highly damaging attacks that compromise customer info
Tags : 
    
Limelight Network
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 30, 2019
US Based leading multinational mass media conglomerate had high volume of actionable tickets open for resolution and other related challenges for which LTI helped in building an event correlation system to find out the Root Cause Analysis of multiple events and analyse number of tickets. This was achieved by leveraging Mosaic Decision platform for processing. Benefits i. 60% reduction in incidents ii. 40% Time saved Download full case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: CA Technologies     Published Date: Aug 26, 2016
Thanks to numerous, headline-making incidents in recent years, cybercrime has risen toward the top of the concern list for many organizations—and the customers with whom they do business.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 26, 2016
It’s impossible for a day to pass in which we don’t hear news of yet another data breach, with its resulting loss of proprietary secrets, financial records or personal information. These incidents span all sectors of the economy: commerce, education and government
Tags : 
    
CA Technologies
Published By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information – not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : 
mobility, competitive advantage, best practices, mobile devices, mobile applications
    
Absolute Software
Published By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
    
Butler Technologies
Published By: KPMG     Published Date: Sep 04, 2019
Operational resilience is high on the regulatory agenda in the UK. A joint discussion paper in 2018 took a broader view of operational resilience to cover all risks to the provision of critical business services with a greater emphasis on recovery and response when incidents occur. Regulators now place the same importance on operational resilience as on financial resilience. This represents a fundamental shift that companies are at different stages of addressing. Based on discussions with clients and regulators here are ten conversations to help guide you through this new landscape.
Tags : 
    
KPMG
Published By: Dell PC Lifecycle     Published Date: May 18, 2018
Companies Prioritize Detection Amidst A Wave Of Security Incidents Advanced endpoint threats and steady attacks change the way that decision-makers at organizations of all sizes and across industries prioritize, purchase, and execute on security initiatives. Now more than ever, IT security professionals recognize the importance of frontline detection and are shifting priorities to close gaps that place their organizations at risk.
Tags : 
    
Dell PC Lifecycle
Published By: CA Technologies     Published Date: Aug 24, 2017
Target, Home Depot, eBay, le Bureau de gestion du personnel des États-Unis... Les incidents de sécurité majeurs subis par ces organisations (et d’autres) récemment sont survenus suite au vol ou à la compromission des informations d’identification d’un utilisateur à forts privilèges qui disposait d’un accès étendu à des systèmes sensibles. Dans près de deux tiers des cas, la violation initiale a été facilitée par la faiblesse des pratiques de sécurité mises en place par un tiers, fournisseur ou partenaire commercial, qui avait accès à un réseau interne. C’est en volant les informations d’identification de ce tiers que les attaquants ont été en mesure d’exploiter les infrastructures informatiques des entreprises visées, pour y localiser des comptes à forts privilèges qu’ils ont ensuite utilisés pour accéder à des systèmes critiques et leur porter atteinte.
Tags : 
    
CA Technologies
Published By: Nozomi     Published Date: Jul 08, 2019
Read this document to learn: NN-OT-Risks-Costs-DOCUMENT How OT cyberattacks cause business disruption The costs of high profile industrial cyber security incidents How to reduce risk with OT visibility and cyber security technology Examples of OT cyber security incidents by industry Complete the form and download the Executive Brief. You'll be on your way to improving your knowledge of the industrial security challenge!
Tags : 
    
Nozomi
Published By: IBM     Published Date: Jan 09, 2017
This report from IBM Emergency Response Services discusses four key trends in cybersecurity based on field experience in responding to client security incidents.
Tags : 
ibm, security, services operations, ibm emergency response services, cybersecurity, cyber crime, enterprise applications
    
IBM
Start   Previous   1 2 3 4 5 6 7    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.