「SECURITY」の検索結果 | 調査のチカラ



日 以降のデータに限定
日 以前のデータに限定





  • ソート条件:
  • 表示件数   :
  • 表示項目   :
  • 検索対象   :
  • 注目レベル:

Gartner Says Worldwide Security Market to Grow 8.7 Percent in 2013

...Gartner Says Worldwide Security Market to Grow 8.7 Percent in 2013Analysts Discuss Security Market Trends at Gartner Security & Risk Management Summit 2013, June 10-13 in National Harbor, MD.As companies continue to expand the technologies they use...


エンドユーザーセキュリティー調査(Dell End-User Security Survey)

...Dell End-User Security Survey The Dell End-User Security Survey paints a picture of a workforce caught between two imperatives: be as productive and efficient on the job, and maintain the security of company data. To ease the friction between...

2015年2月5日Arxan Technologies★フィードバック数:0セキュリティ/ネットワーク



... & BankingAutomotive IoTHealthcare IoTGamingDigital MediaHigh-TechTechnologyArxan Security TechnologyMobile SDKs and WDKsRASPObfuscationWhite-Box CryptographyCryptographic Key ProtectionAPI protectionResourcesDocument Download CenterVideos and WebinarsNewsPress...



...Our approach is grounded in the fundamentals of software security and quality, which we adapt to the unique requirements of each platform, development workflow, or technology. We offer a comprehensive array of managed and professional services...


Risk of security breaches as 69 percent of large US organizations opt for mass market ‘consumer’ cloud services

...Products & SolutionsBest in class security products and consulting services to help you identify and protect what matters the most to your business.IndustryWhy BTWe are proud that our work is recognized time and again by customers, analysts...

2015年1月28日Arbor Networksフィードバック数:0セキュリティ/ネットワーク海外

Worldwide Infrastructure Security Report

...Insight into the Global Threat Arbor Networks 12th Annual Worldwide Infrastructure Security ReportGet a rare view into the most critical security challenges facing today's network operators.DOWNLOAD THE REPORT The trend of significant growth...



...Real Risk Reduction Protect against cyberattacks and data breaches with integrated security controls that discover assets, harden configurations, identify vulnerabilities and detect threats. Operational Efficiency Reduce unplanned work and downtime...


Gartner Says Worldwide Information Security Spending Will Grow Almost 4.7 Percent to Reach $75.4 Billion in 2015

...Gartner Says Worldwide Information Security Spending Will Grow Almost 4.7 Percent to Reach $75.4 Billion in 2015Commoditization of Mature Security Technologies Leads Analysts to Reduce Overall ForecastWorldwide spending on information security...



What makes today’s hackers tick?

.... security layer to protect against cyber-attacks that target privileged accounts to get at critical information assets in your organization. Learn how Secret Server automates the management and security of your enterprise privileged accounts from a single...


The Most Hackable Cars on the Road

...The Most Hackable Cars on the RoadModern automobiles are becoming more reliant on technology for infotainment, operational, security, and safety features that make up the core functionality of the vehicle. These advances use much of the same...

2015年5月13日NTT Innovation Instituteフィードバック数:0セキュリティ/ネットワーク海外

2015 Global Threat Intelligence Report

...NTT Innovation Institute (NTT I) is pleased to announce the release of the 2015 NTT Global Threat Intelligence Report (GTIR). Once again, NTT i worked together with the NTT Group security companies to analyze the attacks, threats and trends from...


New cybersecurity report details risk of running unsupported software

...New cybersecurity report details risk of running unsupported softwarePosted byOn Tuesday, Trustworthy Computing released volume 15 of the Microsoft Security Intelligence Report, which provides threat intelligence and analysis of cyber threats...

2015年9月11日Duo Securityフィードバック数:0セキュリティ/ネットワーク海外

Identifying Bad Apples: Getting to the Core of iOS Vulnerabilities

... or lower, meaning they’re missing out on security patches for over 160 vulnerabilities. Another 14 percent of all iPhones are running a full version behind - iOS 7 or below.All it takes is one vulnerable device accessing your network to put your entire...

Meru Survey of Higher Education IT Leaders Shows WLAN Upgrade Surprising Results

...On July 8th 2015, Meru Networks became part of Fortinet, the global leader in high-performance cyber security solutions. As integration efforts continue we have created a webpage to assist customers find contact information related to Meru Networks...


Security trends in financial services -Key findings and recommendations

... The Microsoft DirectX® End-User Runtime provides updates to 9.0c and previous versions of DirectX — the core Windows® technology that drives high-speed multimedia and games on the PC. Microsoft Security Essentials provides real-time protection...


Accenture Security Index: A Majority of Global Organizations Struggle to Identify and Fully Protect Mission Critical Assets from Cyberattacks

...Accenture Security Index: A Majority of Global Organizations Struggle to Identify and Fully Protect Mission Critical Assets from CyberattacksIndex shows poor performance in critical cybersecurity capabilities across 15 countries and 12 industriesNEW...


インフォグラフィック - パスワードの代替案

...://www.welivesecurity.com/2015/04/01/infographic-alternatives-password/">Infographic: Alternatives to the passwordBY WELIVESECURITY.COM - security news, views and insight from ESET experts...


Survey Says: “What Business Leaders Need to Know about Targeted Attacks”

... is vulnerable to advanced attacks, then security budgets to address the problem will remain limited. As context, a third of respondents to the Harvard Business Review research stated that they are currently being targeted. What’s more, top security concerns...


IBM & Ponemon Institute Study: Data Breach Costs Rising, Now $4 million per Incident

... Security (NYSE: IBM) today announced the results of a global study analyzing the financial impact of data breaches to a company’s bottom line. Sponsored by IBM and conducted by the Ponemon Institute, the study found that the average cost of a data breach...


Different nations’ online banking habits: better safe than sorry?

...Would you bank online without the protection of security software? If your answer is no, then you are in agreement with more than 77% of British internet users who make sure they have a security solution in place when using online financial services...



INFOGRAPHIC: Users weighed down by multiple gadgets - survey reveals the most carried devices

...Skip to contentINFOGRAPHIC: Users weighed down by multiple gadgets – survey reveals the most carried devicesPost navigationThen the Naked Security team counted up how many devices we each carried around every day… well, it was embarrassingly high.So...

2017年2月6日Strategy Analyticsフィードバック数:0デジタル家電

the Top 10 Smart Home Service Providers in the US

... analysis of US providers of fee-based smart home services such as self-monitoring, notification, automation and energy management services -- apart from or in addition to professionally-monitored interactive security. The Top 10 service providers have...

2016年3月9日MobileIron Inc.フィードバック数:0セキュリティ/ネットワーク


...50%以上のエンタープライズは不適合なモバイルデバイスを抱えている 2016年2月23日MobileIron 50%以上のエンタープライズは不適合なモバイルデバイスを抱えている 50%以上のエンタープライズは不適合なモバイルデバイスを抱えているAsiaNet 63479 (0216)【マウンテンビュー(米カリフォルニア州)2016年2月23日PR Newswire=共同通信JBN】 *MobileIron Security Labsが初のMobile Security and Risk...

2014年11月26日AV-TEST Instituteフィードバック数:0セキュリティ/ネットワーク海外

Self-Protection for Antivirus Software

...Skip navigation An Internet security suite provides full system protection, employing all available protection technologies. But what about the self-protection of the system protectors? Do they use protection technologies such as DEP and ASLR...


With just days to go, just how many PCs are still running Windows XP?

...Next Tuesday, April 8 2014, Microsoft will release the last ever security patches for Windows XP.Net Market Share keeps a tally on worldwide operating system and browser usage by measuing the hits on websites and – according to them – Windows XP...


Verizon 2016 Data Breach Investigations Report

... of confirmed data breaches involve using weak, default or stolen passwords.95 percent of breaches and 86 percent of security incidents fall into nine patternsRansomware attacks increased by 16 percent over 2015 findings.Basic defenses continue to be sorely...


Data Security Confidence Index

... lost or stolen in 2016 according to the Gemalto Breach Level Index, the vast majority of IT professionals still believe perimeter security is effective at keeping unauthorized users out of their networks. However, companies are under investing...


2014 Data Breach Investigations Report

...RSA roundtable reportWho’s responsible for cybersecurity?At the 2017 RSA Conference in San Francisco, we brought together senior security professionals from every background — including academia, government, law and finance — to discuss the big...


Global Survey Reveals Security Concerns Holding Back Data Center Consolidation and Cloud Migration

... Management IntegrationsHardware Security ModulesGeneral Purpose HSMsPayments HSMsCustomizable HSMsCrypto ManagementAccess ManagementSafeNet Trusted AccessIdentity-as-a-ServiceCloud Identity ManagementCloud SSOAuthenticationAuthentication...


Imperva Web Application Attack Report (WAAR) #5

..., verticals, technologies as well as to geographical information.Why WAAR Matters?One of the things that keep us intrigued about the data that we gather, is there’s still tons of data to gather. While many other security vendors and products claim to deal...


HP Study Reveals Smartwatches Vulnerable to Attack

...PALO ALTO, Calif., July 22, 2015 — As part of an ongoing series looking at Internet of Things (IoT) security, HP today unveiled results of an assessment confirming that smartwatches with network and communication functionality represent a new...


... and prevention solution. Barracuda Uses AI to Defend Against Spear Phishing and Cyber FraudThere is something to be said for having the right knowledge to avoid a cyber threat. In spite of using relatively little security tools, security professionals...

2015年10月14日University of Cambridgeフィードバック数:0セキュリティ/ネットワーク海外

Security Metrics for the Android Ecosystem

...Security Metrics for the Android EcosystemDaniel R. ThomasAlastair R. BeresfordAndrew RiceComputer LaboratoryUniversity of CambridgeCambridge, United KingdomFirstname.Lastname@cl.cam.ac.ukABSTRACT1.The security of Android depends on the timely...


UK Enterprises Unprepared For New Age of ‘Wear Your Own Device

...powered by Study finds that 77 per cent of organisations do not currently consider wearables as part of their mobile security strategyDecember 2, 2014, United Kingdom – Enterprises in the UK are unprepared to deal with the security risks posed...

2017年2月8日blancco technology groupフィードバック数:0セキュリティ/ネットワーク

Delayed Threat Detection & Breach Notifications Intensify Regulatory Challenges of Data Protection

...SolutionsWe’ve been certified, approved and recommended by 18 national and international governing bodies. No other security firm can boast this level of compliance. Delayed Threat Detection & Breach Notifications Intensify Regulatory Challenges...


Threat of Mobile Malware Persists as Attacks Targeting iOS Devices Increase

... of the challenges that security teams need to think about in preventing an attack on their business critical information. Most notably:Researchers found XcodeGhost, a compromised version of the iOS developer platform Xcode, is still an imminent threat to enterprise...


2016 State of the Software Supply Chain Report

... percent of downloads (1-in-16 components) include a known security defect.Organizations struggle with vulnerable partsData from 25,000 applications demonstrates that 6.8 percent of components in use had at least one known security defect, revealing...


At least 15% of home routers are unsecured

... that routers can be attacked fairly easily, by exploiting one of the frequently found vulnerabilities. This makes them an Achilles heel in the overall internet security of households, as well as small businesses.Unfortunately, this has also proven to be true...

2015年8月10日The Channel Companyフィードバック数:0ビジネス海外

The Top 100 Executives Of 2015

... Management continually shaking things up.It was a year that security breaches continued to wreak havoc on companies, putting more security CEOs on CRN's Most Influential list. And for cloud computing titans, it was another year of record sales, putting more...



Weakest, common passwords of 2014 revealed

... of the importance of security, with a number of high profile password leaks pushing the issue up people’s agendas in the last year.That doesn’t change the top two from remaining the same as 2013, though, with the worryingly weak ‘123456’ and ‘password’ occupying...

Infographic: The power game: Thai junta levels up its power

... provinces of the restive Deep South, Yala, Pattani, and Narathiwat, are still under martial law.2. Civilians are still subjected to trial by military courts in cases related to national security, such as possessing or carrying unauthorised or illegal weapons...


Semiconductor Sales Recover in 2013; Micron Surges to Fourth Place in Global Chip Market

... issues, trendsetting topics and other provocative subjects. Read More IHS shows a deep understanding of the industry and the underlying market trends... Johan Jubbega, Senior VP Sales EMEA (Bosch Security Systems) ;Who We AreWe are the leading source...


Now Hiring: Cyber Defenders Needed

... Security Awareness Month, and to better understand how millennials can help, Raytheon and the National Cyber Security Alliance (NCSA) commissioned the study Securing Our Future: Closing the Cyber Talent Gap, which surveyed young adults ages 18–26 in 12...


November 2014 Web Server Survey

... [pdf] last month, which outlines a stringent set of criteria which must be met by registrants of .trust domains. Many of these policies relate to security, dictating both what must and must not be done – the table of contents alone contains 71 instances...


Gartner Says 4.9 Billion Connected "Things" Will Be in Use in 2015

... security, information technology security, operational technology security and physical security like never before. Executives now face a decision regarding the future of security in their enterprise and who governs, manages and operates it. Gartner said...

Commitment to Development Index 2015

... States takes 23rd place, with low scores on environment and finance.South Korea comes in last with poor showings in environment, trade, and security.Explore all the results below. Adjust weights to see the effect on scores. Unstack the graph to make...

2016年8月11日KASPERSKY labフィードバック数:0大型消費/投資

Kaspersky Lab International Travel Report: the urge to connect at any cost is putting international travelers’ data at risk

... to leave our digital security at home.Of those surveyed, more than half of respondents (58%) travelled abroad for leisure more than once in the last 12 months. Half (49%) travelled abroad in the past year on business, and a third (32%) have done so more...


Security Survey 2016

...AV-ComparativesAV-Comparatives is an independent organization offering systematic testing that checks whether security software, such as PC/Mac-based antivirus products and mobile security solutions, lives up to its promises. Using one...

Worst Airports for Sleeping

... Airports for Sleeping: Bergamo Orio al Serio AirportAggressive security or airport police (speaking Italian only) woke us up around 3am and kicks out people to the other part of terminal because of cleaning. Around 4am they 'open' the terminal and sleeping...


International Study Finds Nearly 40 Percent of Enterprises Hit By Ransomware in the Last Year

... by Osterman Research to explore ransomware attack frequency, how it works in an enterprise environment, ransom cost, infiltration points, impact, preparedness and more.“Over the last four years, ransomware has evolved into one of the biggest cyber security...



  • mixiチェック

RSS Facebook Twitter メルマガ


1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31