landscape

Results 201 - 225 of 846Sort Results By: Published Date | Title | Company Name
Published By: Secureworks     Published Date: Oct 04, 2017
Secureworks has been tracking cybercrime activity for more than 10 years and, as we monitor this activity to protect our clients, we collect a large amount of data on both the criminals and their infrastructure and systems. This annual report presents an overview of the cybercrime landscape and trends we observed primarily from the period of mid-2016 to May 2017, in addition to a handful of other trends ranging from 2015 to 2016.
Tags : 
    
Secureworks
Published By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2017, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors, the global threat landscape, and security trends: • The global WCry and NotPetya campaigns reinforced the need for a layered approach to security. • Attacks used obfuscated malicious files and scripts to bypass filtering and deliver malware. • A Chinese threat group has had repeated success using compromised websites to attack targeted organizations. • Threat actors have been stealing intellectual property from Japanese enterprises.
Tags : 
    
Secureworks
Published By: Lookout     Published Date: Dec 09, 2016
This whitepaper lays out the landscape on potential threats, how the mobile ecosystem is changing, and what security investment looks like from here out.
Tags : 
    
Lookout
Published By: Singularity University     Published Date: Oct 17, 2017
Agile and innovative companies like Netflix, Instagram, Amazon, Airbnb, and Uber have used exponential technologies to completely disrupt their industries. But some of the largest industries in the world have fallen prey to these and other disruptive companies. And most of them didn’t even see it coming. The convergence of exponential technologies, along with bold thinking and the willingness to take risks, is completely altering the business landscape. And that landscape is changing at an accelerating pace. Disruption is occurring far more quickly than ever before. On average, an S&P 500 company is being replaced every 2 weeks, and over 40% of today’s Fortune 500 companies on the S&P 500 will no longer exist within 10 years. The only options are to disrupt yourself or be disrupted by your competition. Which will you choose? If you choose the former, do you know how to proceed? This guide shares strategies you can employ today to start future-proofing your company.
Tags : 
innovation, disruption, technology, business, management, leadership, strategy, revenue, retail, healthcare, manufacturing, government, financial services, learning, future of work, artificial intelligence
    
Singularity University
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
As the threat landscape continues to evolve, you need a practical and robust way to protect privileged access in your enterprise. Analytics that detect new threats and automatically mitigate them are a great way to achieve this. By following these four key steps as you build a PAM threat analytics solution, you’ll be able to establish a more comprehensive and effective approach for addressing internal and external security threats.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: Fiserv     Published Date: Nov 07, 2017
"In today’s ever-evolving lending landscape where loan quality and risk management challenge profitability and the customer experience, technology may be the key to thriving – both now and in the future. Winning financial services institutions will be the ones that transform their business models to place loan quality and risk management at the center of their operations. To facilitate continuous life-of-loan management, inclusive of the requisite data transparency and audit trails that support loan quality and loss mitigation, these institutions will implement and automate a loan completion process. Such a process will manage data quality and access to loan data and documents throughout origination, servicing and sale on the secondary market."
Tags : 
mortgage data quality, loan quality, loan data quality, mortgage quality, loan compliance, lending compliance, mortgage compliance, trid, tila respa integrated disclosure, lending efficiency, loan automation, lending automation, mortgage automation, ucd, uniform closing dataset
    
Fiserv
Published By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 
2018 trends, aml trends, money laundering trends
    
Fiserv
Published By: DocuSign UK     Published Date: Nov 16, 2017
Infographic showing the positive impact DocuSign has had on the environment (landscape)
Tags : 
recycling, initiative, paper, environment, docusign, impact, waste, water, productivity
    
DocuSign UK
Published By: Applause Israel     Published Date: Jun 19, 2018
There’s no denying the effect digital has on the retail industry. $.56 of every $1 spent in physical stores is influenced by digital. What’s more, three of the world’s top five retailers are internetfirst: Amazon, Alibaba, and JD.com. According to PricewaterhouseCoopers’ Total Retail 2017 report, 56% of global shoppers use Amazon. Of these, 28% say they shop less often at retail stores because of Amazon. 18% say they shop less on other retailers’ e-commerce sites because of Amazon. And 10% say they shop exclusively on Amazon. Retailers need to find a way to compete in this changing retail landscape. These five global trends can provide some guidance on where retail is headed and how brands can thrive in this new era of retail.
Tags : 
    
Applause Israel
Published By: Loop Commerce     Published Date: Mar 08, 2019
Fung Global Retail & Technology had the opportunity to interview Roy Erez, Co-Founder and CEO of Loop Commerce. Loop’s gifting solution is already used by many large retailers including Neiman Marcus, Saks Fifth Avenue, and Coach. Erez shared his insights about the gifting category and the emergence of what Loop defines as “G-Commerce” (gift commerce). Loop Commerce is changing the landscape of the online gift-buying and receiving experience, creating new opportunities and leading the way to a $600B gifting market.
Tags : 
    
Loop Commerce
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: Sage People     Published Date: Jan 29, 2018
In our latest survey report, we explore the growth challenges facing businesses and HR leaders in a rapidly changing landscape. We surveyed over 500 HR leaders in leading organisations to explore their views on these challenges, and to find out how they are supporting people and leveraging people data to help them achieve their growth goals.
Tags : 
    
Sage People
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
threats, applications, cybercriminals
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Sep 14, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
    
F5 Networks Inc
Published By: iKnowtion     Published Date: Sep 14, 2010
The terms "customer segmentation" and "customer predictive modeling" are often used interchangeably, however, they're very different and support different business objectives. This paper explains why both are required to effectively compete in today's customer-centric marketing landscape.
Tags : 
crm strategies, customer intelligence, marketing analytics, customer development, marketing effectiveness, iknowtion, segmentation, modeling, predictive modeling, customer centric, targeted, roi
    
iKnowtion
Published By: Taleo     Published Date: Nov 11, 2010
Podcast interview with Gerry Crispin of CareerXroads and Peter Clayton of Total Picture Radio on how recruiters are using Web 2.0 technologies to recruit, brand, collect data, and strategize new avenues in today's talent landscape.
Tags : 
talent management, human capital management, hcm, integrated, integration, visibility, integrate, alignment, employee performance, quality of hire
    
Taleo
Published By: SES     Published Date: Oct 12, 2016
In this eBook, we explore the top 5 connectivity trends that are shaping the data landscape in Asia-Pacifi c, and how satellite serves as a key enabler to drive the future of connectivity
Tags : 
connectivity, wireless communications, collaboration, asia pacific, internet of things, mobile connectivity, bandwidth
    
SES
Published By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : 
network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection, it security
    
Sophos
Published By: Sophos     Published Date: Mar 30, 2017
Threats are becoming increasingly dynamic, forcing organizations to defend against both traditional malware and new advanced attacks. As a result, more and more organizations are making the switch to next-gen endpoint protection from Sophos to get the proven, innovative defense they need. Read this solution brief to learn how Sophos Next-Gen Endpoint Protection delivers the protection, usability and support required to stay ahead of the constantly evolving threat landscape.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
Sophos
Published By: IBM     Published Date: Jan 27, 2017
Today, all consumers can obtain any piece of data at any point in time. This experience represents a significant cultural shift: the beginning of the democratization of data. However, the data landscape is increasing in complexity, with diverse data types from myriad sources residing in a mix of environments: on-premises, in the cloud or both. How can you avoid data chaos?
Tags : 
    
IBM
Published By: Docusign     Published Date: Feb 16, 2015
This White Paper reveals the legal differences of the electronic signatures usage between countries and how this affects for their business.
Tags : 
laws of electronic signatures, electronic signatures, electronic signature landscapes, docusign, electronic signature legality, digital signature laws
    
Docusign
Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape
    
Symantec
Published By: KPMG     Published Date: Jul 10, 2018
The Oracle and KPMG cloud threat report 2018 provides an up-to-date review of the cybersecurity implications and challenges of rapid cloud adoption. Is your organisation prepared? Read this report to find out: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes.
Tags : 
    
KPMG
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.