Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

sign act

Results 251 - 275 of 940Sort Results By: Published Date | Title | Company Name
Published By: KPMG     Published Date: Jul 10, 2018
Businesses are deploying innovative technologies at speed to secure competitive advantage. How can you manage risk effectively in the rush to the future? Read this guide to find out: • what internal and external risks emerging technologies present • which technologies present the biggest risks and the biggest opportunities • how to design a framework for emerging tech governance • what actions to take to put a new governance framework in place.
Tags : 
    
KPMG
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: Reputation.com     Published Date: Jun 29, 2018
HCAHPS is the barometer for understanding a patient’s hospital experience. But can you predict the outcome of your patient satisfaction surveys by reading online reviews from past and present patients? And more importantly, does improving your hospital’s online reputation improve HCAHPS scores? Yes. Reputation.com’s Data Science team, led by Brad Null, Ph.D, analyzed two years of HCAHPS hospital survey data from The Centers for Medicare and Medicaid Services, across more than 4,800 hospitals. The team reviewed the data alongside online reviews, ratings and rankings for those same hospitals, and made some significant discoveries: • Online reviews provide early warning of issues that may impact patient experience, giving hospitals the opportunity to identify and address those issues before patient satisfaction scores suffer. • By continually monitoring, managing, requesting and responding to patient reviews, a healthcare organization can address negative feedback that impacts HCAHPS resu
Tags : 
    
Reputation.com
Published By: IBM     Published Date: Jun 29, 2018
IBM LinuxONE™ is an enterprise Linux server engineered to deliver cloud services that are secure, fast and instantly scalable. The newest member of the family, IBM LinuxONE Emperor™ II, is designed for businesses where the following may be required: • protecting sensitive transactions and minimizing business risk • accelerating the movement of data, even with the largest databases • growing users and transactions instantly while maintaining operational excellence • accessing an open platform that speeds innovation
Tags : 
    
IBM
Published By: Epson     Published Date: Jun 22, 2018
The U.S. workplace is undergoing one of its largest transformations in the past 40 years. Although the magnitude of this evolution is difficult to notice when viewed in short time frames, by 2020, the percentage of employees in the workplace from the Baby Boom and Millennial generations will have completely reversed from the composition in 2010, with Millennials increasing to 50% of the U.S. workforce and Boomers decreasing to 25%. Because of their size, these generations already exercise significant influence on the workplace and will undoubtedly impact the nature of work well into the future.
Tags : 
    
Epson
Published By: Epson     Published Date: Jun 21, 2018
Solvent printing is the perfect solution for signs, vehicle wraps, and many other print applications. Solvent inks produce top-quality graphics, enabling printing service providers (PSPs) to maintain high-volume output and lower production costs while providing their customers superior color gamut and accuracy. Although solvent inks provide great performance and have many additional bene ts, they come with one frustrating work ow drawback: the delays PSPs experience by having to wait for solvent ink to dry, particularly when the application requires lamination. A new breakthrough solvent ink technology solves this problem by reducing print curing time by at least 75% of the 24 hour waiting period normally recognized by media manufacturers and industry specialists. These new solvent inks make it possible for PSPs to laminate solvent prints on the same day they are printed. PSPs can achieve high image quality without sacri cing valuable time, plus they can avoid clutter and reduce spa
Tags : 
    
Epson
Published By: AWS     Published Date: Jun 20, 2018
Data and analytics have become an indispensable part of gaining and keeping a competitive edge. But many legacy data warehouses introduce a new challenge for organizations trying to manage large data sets: only a fraction of their data is ever made available for analysis. We call this the “dark data” problem: companies know there is value in the data they collected, but their existing data warehouse is too complex, too slow, and just too expensive to use. A modern data warehouse is designed to support rapid data growth and interactive analytics over a variety of relational, non-relational, and streaming data types leveraging a single, easy-to-use interface. It provides a common architectural platform for leveraging new big data technologies to existing data warehouse methods, thereby enabling organizations to derive deeper business insights. Key elements of a modern data warehouse: • Data ingestion: take advantage of relational, non-relational, and streaming data sources • Federated q
Tags : 
    
AWS
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
A&D manufacturers and their suppliers now depend more than ever on global supply chains. As they reach across time zones, languages and cultures, supply chains have to work around challenges that build up costs and drag down production schedules. Communication between distributed engineering and production centers can be labored and error-prone. These problems are often compounded by repetitive programming, incomplete simulations, time-intensive production methods, and concern that the shop floor may not be working with current data. Ideally, global companies should be able to design products at any location and produce them at selected sites, with all stakeholders from design to the shop floor working concurrently from a single unique global data source. Understand how manufacturing companies can deliver machined parts faster and increase revenue by reducing costs – despite operating globally across time zones and cultures.
Tags : 
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
As more companies compete for business, Original Equipment Manufacturers (OEMs) increasingly demand higher production rates and greater production flexibility from suppliers. If smaller-sized companies want to compete, they need the right tools and latest technology. NC Machining manufactures should ask three primary questions when considering the tools to improve competitiveness and implement Lean practices: • Do the tools provide the means for improved collaboration between engineering and manufacturing, and incorporate manufacturing best practices? • Can all data and program information reside in one database or platform that is accessible concurrently by all enterprise stakeholders—from design engineering to the shop floor? • Is it possible to perform real-time multi-disciplinary simulations to improve performance and manufacturing targets? Discover how to optimize your NC Machine Shop Production, minim
Tags : 
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
Robot programmers frequently find it challenging to deliver material handling, arc welding, spot welding, or drill and riveting programs that work with certainty on the first run. Because robot programming is not part of the design phase, they are forced to implement fixes and workarounds on the shop floor. Costs escalate as production cycles expand and changes are made without knowledge of the shop floor impacts. DELMIA Robotics on the Dassault Systèmes 3DEXPERIENCE platform delivers high quality, collision-free programs in the native robot language with no need for intervention on the shop floor. In the virtual world, programmers and designers work in concert to create the most productive tooling operations and robot cycle times. Programming can move ahead independently without interrupting production, and robot programs perform predictably the first time. Costs of programming and production are significantly reduced, and products move to market more quickly. Learn how offline robot
Tags : 
    
Dassault Systèmes
Published By: DigiCert     Published Date: Jun 19, 2018
Code signing essentially relies on a Public Key Infrastructure, which means code signing certificates are made out of a pair of public and private key - the public key is signed by a trusted Certificate Authority such as DigiCert, and the private key is kept by the owner and used to sign the code to secure. Although the technology behind code signing certificates is proven, managing them - and by extension managing the private keys - is an activity that can be very complex, especially when the key owner(s) do not understand their value. In order to help customers to solve for the shortcomings in regard to the management of code signing private keys and user access, DigiCert has developed Secure App Service. Download this whitepaper to find out more about how this can help your business.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Our Secure App Service helps protect your business against major financial impacts and brand damage from mismanaged code signing. You get no-worry code signing visibility, agility, and trusted security. We safeguard your keys in our highly secure data centers. You gain complete control over and insight into all code signing activity to protect application life and sales. Our Secure App Service simplifies and scales up code signing for all your target platforms. Backed by the global cyber security leader, you can trust our security, service, and support to protect your business and code signing efforts.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
The Internet of Things (IoT) has rapidly transformed the digital landscape and the world we live in. Intelligent devices and sensors connect smart cars, robotic manufacturing equipment, smart medical equipment, smart cities, industrial control systems, and much more in a way that improves lives and saves businesses billions of dollars. But along with its benefits, rapid IoT growth introduces a new dimension of security vulnerabilities that dramatically escalates the nature and seriousness of cybercrime risks. In addition to traditional confidentiality cyber risks, IoT threats include attacks that can: • Render smart appliances useless • Shut down city power grids • Threaten lives through hacked pacemakers and other medical devices. Such security flaws not only endanger lives, frustrate customers, and disrupt business operations, but they create significant cost and public relations damage for IoT developers and manufacturers.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Many security-minded organizations utilize code signing to provide an additional layer of security and authenticity for their software and files. Code signing is carried out using a type of digital certificate known as a code-signing certificate. The process of code signing validates the authenticity of legitimate software by confirming that an application is from the organization who signed it. While code-signing certificates can offer more security, they can also live an unintended secret life providing cover for attack groups, such as the Suckfly APT group. In late 2015, Symantec identified suspicious activity involving a hacking tool used in a malicious way against one of our customers. Normally, this is considered a low-level alert, however, the hacktool had an unusual characteristic not typically seen with this type of file; it was signed with a valid code-signing certificate. Download this whitepaper to find out more about how you can protect your business from such threats.
Tags : 
    
DigiCert
Published By: Akamai Technologies     Published Date: Jun 14, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
dns< security breach, cyber security
    
Akamai Technologies
Published By: HP Inc.     Published Date: Jun 13, 2018
Watch our video and you’ll see what we mean when we say HP is “reinventing making.” If you’ve been dreaming of making prototypes and parts faster, bigger, and brighter, then the new HP Jet Fusion 300/500 series of 3D printers is the answer to your dreams. Get a peek at how voxel technology has opened new possibilities for design and productivity. Watch HP 3D in action
Tags : 
    
HP Inc.
Published By: MuleSoft     Published Date: Jun 12, 2018
MuleSoft Positioned as a Leader 3 Consecutive Times Read this complimentary copy of the 2018 Gartner Magic Quadrant for Full Lifecycle API Management, and find out why MuleSoft was named a Leader based on completeness of vision and the ability to execute. Read on to learn: Expert perspectives on API Management Critical analysis of key differentiators Latest developments in integration technology Industry benchmarks and trends Gartner Magic Quadrant for Full Life Cycle API Management, Paolo Malinverno, Mark O'Neill, 30 April 2018. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of
Tags : 
    
MuleSoft
Published By: AWS - ROI DNA     Published Date: Jun 12, 2018
Traditional data processing infrastructures—especially those that support applications—weren’t designed for our mobile, streaming, and online world. However, some organizations today are building real-time data pipelines and using machine learning to improve active operations. Learn how to make sense of every format of log data, from security to infrastructure and application monitoring, with IT Operational Analytics--enabling you to reduce operational risks and quickly adapt to changing business conditions.
Tags : 
    
AWS - ROI DNA
Published By: Genesys     Published Date: Jun 11, 2018
Don’t let your communications system hold you back. PBX systems once provided top-of-the-line business communications, but they weren’t designed to accommodate business growth and change. And cloud-based platforms have altered the landscape of business communications. Your PBX isn’t just an inconvenience, it could hurt your business. This eBook covers common problems associated with PBX systems as well as their impact on your business. Learn to identify signs of trouble in your business communications as well as key features to look for in a new system. Don’t let a fear of the unknown hold you back. Download the eBook and learn: • Key warning signs to look for in your PBX • The impact of maintaining an outdated system • How modern communication tools can benefit your business
Tags : 
pbx, cloud, business communications
    
Genesys
Published By: Aviatrix     Published Date: Jun 11, 2018
Once you've designed and secured your Global Transit Network, are you done? Are you ready to hand day-to-day responsibility over to an operations team? Or, are there other elements you need to ensure that the day-to-day operation of your transit hub is efficient and effective? As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, demonstrate the best practices they've gleaned from working with operations teams, all who require: • Visibility: Do you have a way to centrally view your network, see performance bottlenecks, control security policies, and set other configuration details? • Deep Analytics: Can you easily gather performance and audit data and export it to Splunk, DataDog, or other advanced reporting tools? • Monitoring and Troubleshooting: Do you have a real-time view of network health, and how easily can you access the data needed to locate and fix issues? • Alert Management: When issues do occur, what r
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix
Published By: Aviatrix     Published Date: Jun 11, 2018
Join Aviatrix for a discussion of next-generation transit hubs that are purpose-built to treat the network as code, rather than as a virtualized instance of a data center router. Learn how a software-defined approach can transform your AWS transit hub design from a legacy architecture exercise into a strategic infrastructure initiative that doesn’t require you to descend into the command-line interface and BGP of the IT networking world. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix share the requirements that our most successful customers have insisted upon for their Global Transit Networks, and demonstrate the key features that deliver on those requirements. Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud infrastructure managers, cloud engineers, and networking staff.
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix
Published By: Epicor     Published Date: Jun 06, 2018
Today’s manufacturers are looking to increase productivity, assure factory uptime, and thrive despite the changing manufacturing landscape. When you combine an enterprise resource planning (ERP) system with a manufacturing execution system (MES), you’ll find these goals become more achievable because the technology is designed to simplify the modern manufacturing enterprise. You want your organization to operate more efficiently and flexibly. You want to reduce waste and become as lean and efficient as possible. Most importantly, you want to keep pace with the changing competitive environment. These solutions can help with all of that. Read the Epicor eBook, Harness the Power of MES, to learn more about how technology can help your business streamline, compete, and grow.
Tags : 
    
Epicor
Published By: Menlo Security     Published Date: Jun 05, 2018
"2017 was marked by a significant number of high-profile cyber breaches. Web malware and phishing played a critical role in the vast majority of these attacks. Watch this webinar to learn from two of the industry’s leading experts – Gartner Research Analyst Peter Firstbrook and Menlo Security CTO Kowsik Guruswamy: *Why web malware and phishing are so pervasive in today's cyber attacks *What the shortcomings of today’s reactive security philosophy are *Why the web continues to present a risk to businesses *How organizations rethink their security strategy moving forward"
Tags : 
    
Menlo Security
Published By: CA Technologies     Published Date: Jun 01, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.