「SECURITY」の検索結果 | 調査のチカラ



日 以降のデータに限定
日 以前のデータに限定





  • ソート条件:
  • 表示件数   :
  • 表示項目   :
  • 検索対象   :
  • 注目レベル:

Dell Data Security Survey

...Take the uncertainty out of data security by getting ahead of the trends Business and IT decision makers are finally carrying the banner of data security, recognizing not only the safety it brings, but also the opportunity.Off the backburner...


Gartner Says Worldwide Security Market to Grow 8.7 Percent in 2013

...Gartner Says Worldwide Security Market to Grow 8.7 Percent in 2013Analysts Discuss Security Market Trends at Gartner Security & Risk Management Summit 2013, June 10-13 in National Harbor, MD.As companies continue to expand the technologies they use...

2015年2月16日Robert Half Technologyフィードバック数:0セキュリティ/ネットワーク海外

Surge in IT Security Measures Anticipated in 2015

...Surge in IT Security Measures Anticipated in 2015Survey: Employee Training Top Priority for CIOs in Protecting Company InformationFeb 12, 2015 4:12pm,/PRNewswire/ -- Chief information officers (CIOs) are taking a multipronged approach to protecting...


エンドユーザーセキュリティー調査(Dell End-User Security Survey)

...Dell End-User Security Survey The Dell End-User Security Survey paints a picture of a workforce caught between two imperatives: be as productive and efficient on the job, and maintain the security of company data. To ease the friction between...

2015年2月5日Arxan Technologies★フィードバック数:0セキュリティ/ネットワーク



... & BankingAutomotive IoTHealthcare IoTIBMGamingDigital MediaHigh-TechTechnologyArxan Security TechnologyMobile SDKs and WDKsRASPObfuscationWhite-Box CryptographyCryptographic Key ProtectionAPI protectionResourcesDocument Download CenterVideos and WebinarsNewsPress...

2013年11月21日Ernst & Young★フィードバック数:0セキュリティ/ネットワーク海外

Ernst & Youngのレポートです。

Global Information Security Survey 2013

... willsoon learn that hackers have breached the security perimeterof their organization.ImproveAwareness of cyber threatspropels improvements 3Our survey suggests that many more organizations recognize theextent and depth of the threats they face...


Global Survey Reveals Security Concerns Holding Back Data Center Consolidation and Cloud Migration

... SecurityData ComplianceData at Rest EncryptionData in Motion EncryptionDigital SigningCrypto ManagementIoT SecurityPKI SecuritySecure PaymentsEncryption ProductsApplication EncryptionDatabase EncryptionEnterprise Key ManagementFile EncryptionHardware Security...


Risk of security breaches as 69 percent of large US organizations opt for mass market ‘consumer’ cloud services

...’s Annual Meeting, regional summits and strategic events. Risk of security breaches as 69 percent of large US organizations opt for mass market ‘consumer’ cloud servicesData security and trust in cloud-based services are a rapidly growing concern...


Security Survey 2017 Report

...Security Survey 2017www.av-comparatives.orgIT Security Survey 2017Language: EnglishLast Revision: 26th January 2017www.av-comparatives.org-1-Security Survey 2017www.av-comparatives.orgSecurity Survey 2017We conducted our annual survey to improve our...

2015年1月28日Arbor Networksフィードバック数:0セキュリティ/ネットワーク海外

Worldwide Infrastructure Security Report

...Insight into the Global Threat Arbor Networks 12th Annual Worldwide Infrastructure Security ReportGet a rare view into the most critical security challenges facing today's network operators.DOWNLOAD THE REPORT The trend of significant growth...


Gartner Says Worldwide Information Security Spending Will Grow Almost 4.7 Percent to Reach $75.4 Billion in 2015

...Gartner Says Worldwide Information Security Spending Will Grow Almost 4.7 Percent to Reach $75.4 Billion in 2015Commoditization of Mature Security Technologies Leads Analysts to Reduce Overall ForecastWorldwide spending on information security...



...Real Risk Reduction Protect against cyberattacks and data breaches with integrated security controls that discover assets, harden configurations, identify vulnerabilities and detect threats. Operational Efficiency Reduce unplanned work and downtime...

2017年3月11日Check Pointフィードバック数:0セキュリティ/ネットワーク


... with the fact that our networks aremore interconnected than ever means we are all vulnerable. Despite all the moneyspent on cyber security, networks are continually breached and the severity of attacksseems to be on the rise. That begs the question: Are we...


The Most Hackable Cars on the Road

...The Most Hackable Cars on the RoadModern automobiles are becoming more reliant on technology for infotainment, operational, security, and safety features that make up the core functionality of the vehicle. These advances use much of the same...

2015年5月13日NTT Innovation Instituteフィードバック数:0セキュリティ/ネットワーク海外

2015 Global Threat Intelligence Report

...NTT Innovation Institute (NTT I) is pleased to announce the release of the 2015 NTT Global Threat Intelligence Report (GTIR). Once again, NTT i worked together with the NTT Group security companies to analyze the attacks, threats and trends from...


New cybersecurity report details risk of running unsupported software

...New cybersecurity report details risk of running unsupported softwarePosted byOn Tuesday, Trustworthy Computing released volume 15 of the Microsoft Security Intelligence Report, which provides threat intelligence and analysis of cyber threats...

2015年9月11日Duo Securityフィードバック数:0セキュリティ/ネットワーク海外

Identifying Bad Apples: Getting to the Core of iOS Vulnerabilities

... or lower, meaning they’re missing out on security patches for over 160 vulnerabilities. Another 14 percent of all iPhones are running a full version behind - iOS 7 or below.All it takes is one vulnerable device accessing your network to put your entire...

Meru Survey of Higher Education IT Leaders Shows WLAN Upgrade Surprising Results

...On July 8th 2015, Meru Networks became part of Fortinet, the global leader in high-performance cyber security solutions. As integration efforts continue we have created a webpage to assist customers find contact information related to Meru Networks...


IBM & Ponemon Institute Study: Data Breach Costs Rising, Now $4 million per Incident

... Security (NYSE: IBM) today announced the results of a global study analyzing the financial impact of data breaches to a company’s bottom line. Sponsored by IBM and conducted by the Ponemon Institute, the study found that the average cost of a data breach...


Accenture Security Index: A Majority of Global Organizations Struggle to Identify and Fully Protect Mission Critical Assets from Cyberattacks

...Accenture Security Index: A Majority of Global Organizations Struggle to Identify and Fully Protect Mission Critical Assets from CyberattacksIndex shows poor performance in critical cybersecurity capabilities across 15 countries and 12 industriesNEW...


インフォグラフィック - パスワードの代替案

...://www.welivesecurity.com/2015/04/01/infographic-alternatives-password/">Infographic: Alternatives to the passwordBY WELIVESECURITY.COM - security news, views and insight from ESET experts...


Survey Says: “What Business Leaders Need to Know about Targeted Attacks”

... is vulnerable to advanced attacks, then security budgets to address the problem will remain limited. As context, a third of respondents to the Harvard Business Review research stated that they are currently being targeted. What’s more, top security concerns...


Different nations’ online banking habits: better safe than sorry?

...Would you bank online without the protection of security software? If your answer is no, then you are in agreement with more than 77% of British internet users who make sure they have a security solution in place when using online financial services...



INFOGRAPHIC: Users weighed down by multiple gadgets - survey reveals the most carried devices

...Skip to contentINFOGRAPHIC: Users weighed down by multiple gadgets – survey reveals the most carried devicesPost navigationThen the Naked Security team counted up how many devices we each carried around every day… well, it was embarrassingly high.So...

2017年2月6日Strategy Analyticsフィードバック数:0デジタル家電

the Top 10 Smart Home Service Providers in the US

... analysis of US providers of fee-based smart home services such as self-monitoring, notification, automation and energy management services -- apart from or in addition to professionally-monitored interactive security. The Top 10 service providers have...

2016年3月9日MobileIron Inc.フィードバック数:0セキュリティ/ネットワーク


...50%以上のエンタープライズは不適合なモバイルデバイスを抱えている 2016年2月23日MobileIron 50%以上のエンタープライズは不適合なモバイルデバイスを抱えている 50%以上のエンタープライズは不適合なモバイルデバイスを抱えているAsiaNet 63479 (0216)【マウンテンビュー(米カリフォルニア州)2016年2月23日PR Newswire=共同通信JBN】 *MobileIron Security Labsが初のMobile Security and Risk...

2014年11月26日AV-TEST Instituteフィードバック数:0セキュリティ/ネットワーク海外

Self-Protection for Antivirus Software

...An Internet security suite provides full system protection, employing all available protection technologies. But what about the self-protection of the system protectors? Do they use protection technologies such as DEP and ASLR for their own use? AV...


With just days to go, just how many PCs are still running Windows XP?

...Next Tuesday, April 8 2014, Microsoft will release the last ever security patches for Windows XP.Net Market Share keeps a tally on worldwide operating system and browser usage by measuing the hits on websites and – according to them – Windows XP...


Verizon 2016 Data Breach Investigations Report

... of confirmed data breaches involve using weak, default or stolen passwords.95 percent of breaches and 86 percent of security incidents fall into nine patternsRansomware attacks increased by 16 percent over 2015 findings.Basic defenses continue to be sorely...


2014 Data Breach Investigations Report

...RSA roundtable reportWho’s responsible for cybersecurity?At the 2017 RSA Conference in San Francisco, we brought together senior security professionals from every background — including academia, government, law and finance — to discuss the big...


Security trends in financial services -Key findings and recommendations

... The Microsoft DirectX® End-User Runtime provides updates to 9.0c and previous versions of DirectX — the core Windows® technology that drives high-speed multimedia and games on the PC. Microsoft Security Essentials provides real-time protection...


Imperva Web Application Attack Report (WAAR) #5

..., verticals, technologies as well as to geographical information.Why WAAR Matters?One of the things that keep us intrigued about the data that we gather, is there’s still tons of data to gather. While many other security vendors and products claim to deal...


HP Study Reveals Smartwatches Vulnerable to Attack

...PALO ALTO, Calif., July 22, 2015 — As part of an ongoing series looking at Internet of Things (IoT) security, HP today unveiled results of an assessment confirming that smartwatches with network and communication functionality represent a new...


... Safe and SoundLost email is never a problem with a Message Archiver on the job, preventing accidental deletions and enforcing compliance requirements. Barracuda Networks Looks to Ease Cloud Security FearsThe biggest objection when it comes to public...

2015年10月14日University of Cambridgeフィードバック数:0セキュリティ/ネットワーク海外

Security Metrics for the Android Ecosystem

...Security Metrics for the Android EcosystemDaniel R. ThomasAlastair R. BeresfordAndrew RiceComputer LaboratoryUniversity of CambridgeCambridge, United KingdomFirstname.Lastname@cl.cam.ac.ukABSTRACT1.The security of Android depends on the timely...


UK Enterprises Unprepared For New Age of ‘Wear Your Own Device

...powered by Study finds that 77 per cent of organisations do not currently consider wearables as part of their mobile security strategyDecember 2, 2014, United Kingdom – Enterprises in the UK are unprepared to deal with the security risks posed...


The State of Encryption Today

... company data• To protect employee personnel dataData securityUnfortunately these good intentions aren’t always translating into security action. A littleover a third (31%) of organizations don’t always encrypt their financial information and 45...

2016年8月11日KASPERSKY labフィードバック数:0大型消費/投資

Kaspersky Lab International Travel Report: the urge to connect at any cost is putting international travelers’ data at risk

... to leave our digital security at home.Of those surveyed, more than half of respondents (58%) travelled abroad for leisure more than once in the last 12 months. Half (49%) travelled abroad in the past year on business, and a third (32%) have done so more...


2016 State of the Software Supply Chain Report

... percent of downloads (1-in-16 components) include a known security defect.Organizations struggle with vulnerable partsData from 25,000 applications demonstrates that 6.8 percent of components in use had at least one known security defect, revealing...


Threat of Mobile Malware Persists as Attacks Targeting iOS Devices Increase

... of the challenges that security teams need to think about in preventing an attack on their business critical information. Most notably:Researchers found XcodeGhost, a compromised version of the iOS developer platform Xcode, is still an imminent threat to enterprise...

2017年2月8日blancco technology groupフィードバック数:0セキュリティ/ネットワーク

Delayed Threat Detection & Breach Notifications Intensify Regulatory Challenges of Data Protection

...SolutionsWe’ve been certified, approved and recommended by 18 national and international governing bodies. No other security firm can boast this level of compliance. Delayed Threat Detection & Breach Notifications Intensify Regulatory Challenges...

2017年3月14日Quacquarelli Symondsフィードバック数:0社会/政治

QS World University Rankings by Subject 2017

... the site's editorial content and network of student contributors. He also plays a key editorial role in the publication of several guides and reports, including the QS Top Grad School Guide. Hi , I am information security professional . I want...


At least 15% of home routers are unsecured

... that routers can be attacked fairly easily, by exploiting one of the frequently found vulnerabilities. This makes them an Achilles heel in the overall internet security of households, as well as small businesses.Unfortunately, this has also proven to be true...


November 2014 Web Server Survey

... [pdf] last month, which outlines a stringent set of criteria which must be met by registrants of .trust domains. Many of these policies relate to security, dictating both what must and must not be done – the table of contents alone contains 71 instances...

Infographic: The power game: Thai junta levels up its power

... provinces of the restive Deep South, Yala, Pattani, and Narathiwat, are still under martial law.2. Civilians are still subjected to trial by military courts in cases related to national security, such as possessing or carrying unauthorised or illegal weapons...

Commitment to Development Index 2015

... place, with low scores on environment and security.Switzerland comes in last with poor showings in finance, environment, and trade.Explore all the results below. Adjust weights to see the effect on scores. Unstack the graph to make easier comparisons...



Weakest, common passwords of 2014 revealed

... of the importance of security, with a number of high profile password leaks pushing the issue up people’s agendas in the last year.That doesn’t change the top two from remaining the same as 2013, though, with the worryingly weak ‘123456’ and ‘password’ occupying...

2015年8月10日The Channel Companyフィードバック数:0ビジネス海外

The Top 100 Executives Of 2015

... Management continually shaking things up.It was a year that security breaches continued to wreak havoc on companies, putting more security CEOs on CRN's Most Influential list. And for cloud computing titans, it was another year of record sales, putting more...


Gartner Says 4.9 Billion Connected "Things" Will Be in Use in 2015

... security, information technology security, operational technology security and physical security like never before. Executives now face a decision regarding the future of security in their enterprise and who governs, manages and operates it. Gartner said...

2013年7月30日NPD DisplaySearchフィードバック数:7デジタル家電海外

Shipments of Tablet PCs Expected to More Than Double Those of Notebook PCs in 2014, NPD DisplaySearch Reports

... are expected to drive the development of IoT. Learn more IHS shows a deep understanding of the industry and the underlying market trends... Johan Jubbega, Senior VP Sales EMEA (Bosch Security Systems) ;Who We AreWe are the leading source of information...



  • mixiチェック

RSS Facebook Twitter メルマガ


        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30