Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Security Breach

RSS Feed   
Security Breach Reports
 
2019 True Cost of Fraud Study
sponsored by LexisNexis® Risk Solutions
ANALYST REPORT: The LexisNexis® Risk Solutions 2019 True Cost of Fraud Study explores the evolution, expansion and cost of fraud to deliver insights and recommendations on how to effectively sustain your business, successfully manage fraud risks and strengthen customer trust and loyalty. Download the report to explore key findings.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

LexisNexis® Risk Solutions

Securing Hospitality IT Infrastructure
sponsored by CyberArk Software, Inc
WHITE PAPER: When it comes to cybersecurity, the hospitality industry has a threat surface unlike any other vertical sector. Privileged accounts are everywhere in the hospitality industry technology stack. In this white paper, learn what hospitality organizations should do to reduce the risk posed to privileged access by attackers.
Posted: 26 Aug 2019 | Published: 30 Apr 2019

CyberArk Software, Inc

How long does it take to get owned?
sponsored by ComputerWeekly.com
RESEARCH CONTENT: A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.
Posted: 23 Apr 2019 | Published: 23 Apr 2019

ComputerWeekly.com

Online Retail Threats Credential Stuffing
sponsored by Shape Security
WHITE PAPER: In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

Shape Security

Can Cryptography Save Our Elections
sponsored by RSA Conference
RESOURCE: Microsoft's recent unveiling of open source ElectionGuard is the latest response to an increasingly urgent question: How secure are our elections? And if it can lock down votes, then what else is cryptography capable of? Download this podcast transcript to learn more about cryptography's expanding role in cybersecurity.
Posted: 26 Jul 2019 | Published: 23 May 2019

RSA Conference

Pogo Paradox: Is Your Infrastructure Your Worst Enemy?
sponsored by PortSys
RESOURCE: In today’s modern hybrid enterprise, where users access multiple apps – both local and cloud – from anywhere in the world through multiple devices, credentials alone just don’t make the grade anymore. In this blog, learn more about the shortcomings of today’s complex maze of security solutions and how a zero-trust philosophy can help.
Posted: 14 Oct 2019 | Published: 15 Sep 2019

PortSys

Accelerate ERP Threat Detection
sponsored by Appsian
WHITE PAPER: Your ERP applications house your organization's most sensitive data, making them a tempting target for cyber-attacks. This calls for improved threat detection and remediation features in your security infrastructure. In this white paper, learn how Appsian's Real-Time Analytics solution can help your organization prevent ERP data breaches.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian

The Age of Digital Transformation: 5 Keys to Securing Your Business Critical Applications
sponsored by Cyber-Ark Software
WHITE PAPER: The digital transformation of enterprise IT has increased the challenge of protecting business critical applications. Securing business-critical applications means access must be reserved for individuals with the proper credentials and permissions. In this white paper, learn 5 key requirements to better protect your business critical applications.
Posted: 12 Jul 2019 | Published: 31 Mar 2019

Cyber-Ark Software

Retail & Ecommerce: Securing Your Brand and Locking in Consumer Confidence
sponsored by Cyber-Ark Software
WHITE PAPER: The retail marketplace sector is facing a perfect storm of vulnerabilities. To address these vulnerabilities, organizations should implement an effective privileged access security strategy. In this white paper, learn how to create an action plan that can help your retail organization secure their privileged accounts and credentials.
Posted: 09 Jul 2019 | Published: 30 Apr 2019

Cyber-Ark Software

Securing the Grid Why Privileged Access Security is Key to Protecting Critical Energy & Utilities Infrastructure
sponsored by Cyber-Ark Software
WHITE PAPER: One of the largest security vulnerabilities faced by companies in the energy and utilities sector is privileged accounts, and the access they provide. In this white paper, learn how energy and utilities organizations can proactively reduce the risk posed by privileged access.
Posted: 10 Jul 2019 | Published: 30 Apr 2019

Cyber-Ark Software
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement