hr trends

Results 201 - 225 of 239Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Aug 09, 2013
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Learn more.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Symantec     Published Date: Oct 07, 2014
The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Highlights from the 2014 Internet Security Threat Report Key Findings • 91% increase in targeted attacks campaigns in 2013 • 62% increase in the number of breaches in 2013
Tags : 
internet security, target attacks, breaches, threat activity, emerging trends, cybercrime
    
Symantec
Published By: Symantec     Published Date: Nov 21, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Key Findings • The .doc file type was the most common attachment type used in spear-phishing attacks, making up more than 52.9 percent of all attachments in September. • The largest data breach reported in September actually took place in April, and resulted in the exposure of 56 million identities. • There were 600 vulnerabilities disclosed in the month of September, the highest number so far in 2014 and second-highest in the last 12 months.
Tags : 
cyber security threats, harmful business risks, malware, spam, intelligence team
    
Symantec
Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: StrongMail     Published Date: Sep 28, 2010
Break through consumer consciousness with lessons from the Q3 2010 Email Breakthrough Report's featured best-in-class email campaigns. Read about the top five trends to watch and read expert commentary on each featured campaign, ranging from effective application of movement in email, to leveraging subscribers' word of mouth to promote your brand.
Tags : 
strongmail, email breakthrough, report, email campaigns, emarketing
    
StrongMail
Published By: CollabNet     Published Date: Jan 07, 2011
Join Victoria Griggs, Sr. Director of Marketing, and Chris Clarke, VP of Product Management and Strategy at CollabNet, to review Agile ALM adoption trends, challenges, and real world success stories from teams who have combined Agile methods with application lifecycle management for real business results.
Tags : 
collabnet, agile alm, product management, application lifecycle management, collaboration
    
CollabNet
Published By: ESET, LLC.     Published Date: Apr 27, 2011
Global Threat Trends is a monthly report created by ESET that includes a review of the current events in the world of information security and the top ten threats of the month.
Tags : 
eset, blackhat japanning, global threat report, david harley, urbanschrott, disaster scam, malware reporting, inf/autorun, win32/conficker, win32/psw.onlinegames, win32/sality, bflient, autoit, tifaut.c, spy.ursnif.a
    
ESET, LLC.
Published By: Limelight Networks     Published Date: May 03, 2011
In this whitepaper you will learn about the three major trends re-shaping the ecommerce landscape: Video as a way to enhance the shopping experience; Mobile as a channel for expanding marketing reach; and Personalization informed by advanced analytics.
Tags : 
limelight networks, rich-media strategies, ecommerce, online retail, consumer behavior, video, mobile, personalization, analytics
    
Limelight Networks
Published By: Achievers     Published Date: Mar 21, 2012
The key to unlocking performance and growth is aligning the actions and goals of employees with the priorities of the organization. Read Aberdeen's research on Rewards and Recognition to learn how to align employees to your organization and inspire performance.
Tags : 
employee recognition, employee engagement, employee rewards, hr trends, generation, gen x, gen y, millennials, retention, engage, business results, corporate culture
    
Achievers
Published By: Achievers     Published Date: Mar 21, 2012
Organizations spend over $48 billion per year on employee rewards and recognition programs; however there are critical limitations to the traditional approach. In this research bulletin, Bersin & Associates discusses how Rewards and Recognition has changed to cater today's workforce.
Tags : 
employee recognition, employee engagement, employee rewards, hr trends, generation, gen x, gen y, millennials, retention, engage, business results, corporate culture
    
Achievers
Published By: Achievers     Published Date: Oct 01, 2012
The key to success is driving employee performance, through recognizing the right behaviors that impact the big picture. Read Paul Hebert's whitepaper to learn how one recognition platform can help you cut costs and increase efficiency.
Tags : 
employee recognition, employee engagement, employee rewards, hr trends, generation, gen x, gen y, millennials, retention, engage, business results, corporate culture, company values, employee behaviors
    
Achievers
Published By: Achievers     Published Date: Oct 01, 2012
Did you know most companies have an employee recognition program, but their employees don't know it? Read Bersin's report and learn why this topic is not only important, but the key lever to business success.
Tags : 
employee recognition, employee engagement, employee rewards, hr trends, generation, gen x, gen y, millennials, retention, engage, business results, corporate culture, company values, employee behaviors
    
Achievers
Published By: Achievers     Published Date: Dec 11, 2012
The key to business success is through employees that display the right behaviors to drive results, which are amplified by recognition. Read this white paper to learn the seven keys to creating a successful employee recognition program.
Tags : 
employee recognition, employee rewards, online recognition program, trends, human resources
    
Achievers
Published By: Achievers     Published Date: Dec 11, 2012
Managers that use employee recognition benefit from increased employee performance and achievement of organizational goals. Read this white paper to understand why managers are a critical component for successful employee recognition programs
Tags : 
employee recognition, employee rewards, online recognition program, trends, human resources
    
Achievers
Published By: Achievers     Published Date: Dec 11, 2012
Organizations that incorporate technology into their employee recognition strategy outperform those that do not. Read Bersin & Associate’s research to learn how HR can benefit from creating an integrated online recognition program.
Tags : 
employee recognition, employee rewards, hr technology, online recognition program, trends, human resources
    
Achievers
Published By: Achievers     Published Date: Jan 28, 2013
Employee recognition has become powerful in the workplace but today’s changing workforce requires more than the standard online recognition program. Read this e-book to learn the top trends for employee recognition programs in 2013.
Tags : 
employee recognition, employee rewards, online recognition program, trends, human resources
    
Achievers
Published By: Achievers     Published Date: Jan 28, 2013
The field of employee rewards and recognition is changing. Download the 2013 guide for a crash course in current trends and best practices to manage your successful implementation.
Tags : 
employee recognition, employee rewards, online recognition program, trends, human resources
    
Achievers
Published By: Achievers     Published Date: Jan 28, 2013
Comparing the CEO perspective on employee engagement with actual employee experience gives surprising insight into improving corporate programs. Read this white paper to see where the viewpoints differ most and how to bridge the gap.
Tags : 
employee recognition, employee rewards, online recognition program, trends, human resources
    
Achievers
Published By: Globoforce     Published Date: Aug 02, 2012
Employee engagement is one of the most important objectives for today's HR leaders. We know we need it. We know we want it. We know it boosts our bottom line. But what isn't always clear is what drives it, and how to get it. Connecting with employees effectively can be a mysterious puzzle at times. What is important to them? What would motivate them to work more productively? What makes them feel valued? There is, thankfully, a better way than tea leaves or crystal balls. Globoforce-the world leader in employee recognition-surveys fully-employed workers in the United States twice a year to answer those very questions. Our aim is to gain more insight into people's attitudes and perspectives on employee recognition, appreciation and engagement. By capturing the current mood of the U.S. workforce, we can examine broader trends in recognition and job satisfaction. The goal of this report is provide you with invaluable insights that can be used to craft strategies that will unify and engage your workforce and culture.
Tags : 
workforce, mood tracker, employee recognition, globoforce, technology, business, employees, human resources, marketing, finance
    
Globoforce
Published By: Adobe     Published Date: Oct 19, 2012
Three trends have altered the Web content management market since 2011: social media, mobile computing and WCM used in more comprehensive solutions toward online channel optimization. Read on to learn more about WCM and the best in class solutions.
Tags : 
wcm, adobe, web content management, java, .net, social media, customer experience, online channel
    
Adobe
Published By: Adobe     Published Date: Aug 05, 2014
Social media continues to shape the digital marketplace with how brands can engage their consumer. Whether its through a sponsored link on Twitter, an inline ad with Facebook, or retail placement on Pinterest, an understanding of the current trends will go a long way to producing a successful social media marketing campaign.
Tags : 
social media, digital, brands, marketing campaign, consumer, digital marketplace
    
Adobe
Published By: Dell SecureWorks     Published Date: May 28, 2013
Examining threats over an extended period of time reveals current trends as well as clues about the future direction of attacker activity.
Tags : 
software vulnerabilities, global-scale threats, distributed denial of service attacks, advanced persistent threats, mobile threats, threat scenarios, attack trends, future attacks
    
Dell SecureWorks
Published By: Symantec     Published Date: Oct 07, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.
Tags : 
intelligence, cyber security, threats, trends, malware, spam, business risks
    
Symantec
Published By: Cisco     Published Date: Aug 18, 2014
You have to know the threats to stop them. It's not a question of if – but when and how – Internet criminals will get into your network. The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the revival of distributed denial-of-service (DDoS) attacks.
Tags : 
security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network, vulnerabilities
    
Cisco
Published By: Cyveillance     Published Date: Jun 20, 2014
Learn about the recent trends and the 2014 outlook for the mobile security threat landscape. Find out how your organization can better prepare to prevent threats that could disrupt your business.
Tags : 
cyveillance, mobile security, cyberattacks, threats, malicious attacks
    
Cyveillance
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Resource Library