arms race

Results 1 - 9 of 9Sort Results By: Published Date | Title | Company Name
Published By: Riskified     Published Date: Aug 06, 2019
Online fraud is becoming more and more sophisticated, as cybercriminals try and keep a step ahead of fraud solutions and tools. One of the results of this arms race is the recent surge in ATO – account takeover – attacks, a form of fraud which is particularly difficult to detect. In 2017 ATO led to $5.1 billion in losses, a staggering 122% increase over the $2.3 billion lost in 2016.
Tags : 
    
Riskified
Published By: Arbor     Published Date: Sep 15, 2014
In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.
Tags : 
cyber defenses, threat actors, it security, security analytics
    
Arbor
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Like many senior living communities across the country, the staff of The Terraces of Los Gatos works hard to ensure a safe and peaceful environment for their residents. In 2011, two primary concerns for administrators were the need to reduce pressure ulcers by ensuring a regular and auditable turning schedule for each resident, as well as the desire to reduce frequent audible fall alarms, which were bothersome to both staff and residents. Read this case study to learn how The Terraces of Los Gatos ensures dignified resident care with a completely touch-free monitoring solution.
Tags : 
patient safety monitoring, healthcare, retirement community, resident care, nursing
    
STANLEY Healthcare
Published By: CrowdStrike     Published Date: Jun 06, 2018
Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where noexecutable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks will be subsiding anytime soon. Read this white paper to get the important information you need to successfully defend your company against stealthy fileless attacks. Download this white paper to learn: • The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence • How fileless attacks exploit trusted systems — the types of processe
Tags : 
    
CrowdStrike
Published By: Adobe     Published Date: Apr 03, 2015
Download the Top 10 Mobile Predictions for 2015 to learn how you can win big in the new year by investing heavily in mobile marketing. You’ll learn about the oncoming mobile technology arms race — and you’ll discover the steps you must take to stay ahead of the pack. Download the report now to see all ten predictions and actions for marketers, including: • How mobile technologies will disrupt entire industries. And what you must do to prepare. • Why mobile moments will shrink to micro-moments. And which strategies you’ll need to integrate. • How mobile wallets will soon take over. And what you can do to seize the opportunities.
Tags : 
mobile marketing, mobile technology, personalization, mobile wallets, adobe, marketing
    
Adobe
Published By: Cisco     Published Date: Jan 15, 2015
For nearly 10 years, viruses endured as the primary method of attack, and over time they were largely matched by defenders’ ability to block and protect against them. Motivated by the notoriety and the knowledge gained by the discovery and publicizing of new vulnerabilities, attackers continued to innovate. What ensued were distinct threat cycles, an “arms race,” so to speak. Approximately every five years attackers would launch new types of threats— from macroviruses to worms to spyware and rootkits—and defenders would quickly innovate to protect networks from them.
Tags : 
attacks, viruses, protection, networks, threats, arms race, vulnerabilities, macroviruses, worms, spyware, rootkits, defenders
    
Cisco
Published By: Adobe     Published Date: Mar 06, 2015
Download the Top 10 Mobile Predictions for 2015 to learn how you can win big in the new year by investing heavily in mobile marketing. You’ll learn about the oncoming mobile technology arms race — and you’ll discover the steps you must take to stay ahead of the pack.
Tags : 
mobile predictions, adobe, mobile trends, mobile wallets, mobile industry
    
Adobe
Published By: DigiCert     Published Date: Jun 19, 2018
Protect your business, brand and customers in a constantly evolving threat landscape. As market and business needs evolve, and the technological arms race between cybercriminals and the security industry continues, the boundaries of website and web security are shifting. This paper explores the opportunities, risks and challenges, associated with this rapidly evolving landscape both from a business and technical standpoint, and lays out key guidelines for building an effective security strategy for the future.
Tags : 
    
DigiCert
Search Resource Library