「prevent」の検索結果 | 調査のチカラ



日 以降のデータに限定
日 以前のデータに限定





  • ソート条件:
  • 表示件数   :
  • 表示項目   :
  • 検索対象   :
  • 注目レベル:


... delivers actionable information about known and unknown threats regardless of the infection’s source, entry vector or OS of the device. It arms responders with definitive evidence so they can rapidly prevent loss on high-risk devices while blocking activity...


Internet-wide efforts to fight email phishing are working

... don't understand how any of these protocols will have a lasting impact on larger problem of phishing. Maybe you could help me with that? What they seem to do, under the best of circumstances, is prevent spoofing of the domain in one small technical...


Gartner Says Worldwide Security Market to Grow 8.7 Percent in 2013

... to either prevent or detect these newly emergent attacks and persistent penetration strategies. This layered approach is typical of many enterprise organizations and is often managed in independent ways to accomplish stated security goals, namely, detect...


HP Study Reveals Smartwatches Vulnerable to Attack

... updates were signed to help prevent the installation of contaminated firmware. While malicious updates cannot be installed, lack of encryption allows the files to be downloaded and analyzed.Privacy Concerns: All smartwatches collected some form of personal...



... further stimulate demand but this may not be enough to prevent vacancies from rising slightlyNew facilities in the Greater Osaka region and Fukuoka reported strong demand in Q2 2014Q2 2014 saw the completion of just one new logistics facility...



... needs. However, reducing the consumption of fossil fuel is asked in order to prevent the global warming and to suppress the rise of agricultural production cost. As a result of the price competitiveness of heat pump (HP) with high energy efficiency...


2016 Notorious Markets List

... counterfeiting in online marketplaces,” said Froman. “The 2016 List underscores the need for accountable governments everywhere to take on these forms of piracy and counterfeiting at every stage of the global supply chain to prevent final products that put health...

2017年2月8日blancco technology groupフィードバック数:0セキュリティ/ネットワーク

Delayed Threat Detection & Breach Notifications Intensify Regulatory Challenges of Data Protection

... and six months to detect a security threat and 5 percent only detect a threat when notified by external parties.While threat detection plays a vital role in helping organizations prevent data loss/theft, it’s equally important for organizations to notify...


hotel.info Check: Hotels between spotless and dirty

... of European hotels can also help to prevent unpleasant surprises such as in Paris (7.63). There are, of course, many excellent hotels in the capital city but there are also hoteliers who do not pay much attention to cleanliness.It is essential to always...

2016年3月2日Brand Financeフィードバック数:0マーケティング

The World’s Most Powerful Brands 2016

... by German regulators for attempting to prevent retailers from discounting its products. It was also accused of colluding in censorship for trying to prevent dissident Chinese artist Ai Wei Wei from using Lego in his work. Lego has since reversed its policy...

2014年11月26日AV-TEST Instituteフィードバック数:0セキュリティ/ネットワーク海外

Self-Protection for Antivirus Software

... Layout Randomization stands for a shuffling of memory sectors, making it more difficult to exploit security gaps in computer systems. Using ASLR, stack addresses are randomly allocated to applications. This is intended to prevent, or at least impede...

2015年6月5日Huffington Postフィードバック数:0ライフスタイル海外


... to announce how to further prevent the spread of Middle East Respiratory Syndrome (MERS) at the government complex in Seoul, South Korea, Sunday, May 31, 2015. China on Friday confirmed its first case of MERS in a South Korean businessman who ignored...


Mobile Threat Report Q4 2012

...Callisto Group Published Apr 2017 The Callisto Group threat actor's primary interest is gathering foreign and security policy intelligence. In early 2016, they began sending highly targeted phishing emails... Ransomware How to prevent, predict...



... need to not only reduce and prevent supply chain risks, such as supply shortages, production disruptions or quality issues, but also to better leverage segmentation and cost-to-serve analysis programs for more profitable operations. The lynchpin...


April 2014 Web Server Survey

... this is not Microsoft's largest ever market share (it reached 37% in October 2007), this is the closest it has ever been to Apache's leading market share, leaving Apache only 4.7 points ahead. Although Apache gained 6.9 million sites, this was not enough to prevent its...


Verizon 2016 Data Breach Investigations Report

... key logging.Use of the credentials for further attacks, for example, to log into third-party websites like banking or retail sites."The goal is to understand how the cybercriminals operate," said Sartin. "By knowing their patterns, we can best prevent...


IT Transformation Maturity Curve(ITトランスフォーメーション成熟度曲線)

... would like to change your preferred language or country of origin, please click here. Detect, investigate, and respond to advanced threats. Confirm and manage identities. Ultimately, prevent IP theft, fraud, and cybercrime.Explore products and solutions...

Infographic: The power game: Thai junta levels up its power

... be held responsible for actions to prevent threats to national security.14. Section 14 of NCPO Order 3/2015 to impose Section 44 does not prohibit affected parties from claiming compensation from the government in accordance with the Public Officials...



...家保護と両立する自由料金の選択促進策が求められる。この手段としては、自由料金から規制料金への回帰を認めることや自由化への懸念を解消することが有効である。A large number of residential customers do not choose market based tariffs under existence of regulated retail tariffs in Europe, which could prevent retail competition. It is important to understand...

2013年8月8日IC Insightsフィードバック数:0製造業/エレクトロニクス海外

IC Insights Reveals Big Changes to 1H13 Top 20 Semiconductor Supplier Ranking

...% surge in sales, a significant rebound but one that still may not prevent the company from posting another full-year decline in sales in 2013 (AMD registered a steep 17% sales decline in 2012).More details on the 1H13 top 25 semiconductor suppliers...


Targeted Cyberattacks Logbook

....Finally, the virus will overwrite the master boot record of the system to prevent it from bootingShamoon targeted a specific company: Saudi’s Aramco Special featuresAbility to scan computers for data, open backdoors, and send data through those backdoors...


リレーショナルデータベースが新型データ性能に対応するため進化中 (原題: Relational Databases are Evolving to Support New Data Capabilities)

... cost and complexity and poses greater risk for the enterprise.”Some findings from the study are:Developers’ NoSQL freedom carries a cost. More than half—52%—of respondents said they were unable to prevent developers from deploying new applications...



New Digital Universe Study Reveals Big Data Gap: Less Than 1% of World’s Data is Analyzed; Less Than 20% is Protected

.... Ultimately, prevent IP theft, fraud, and cybercrime.Explore products and solutions from RSA. Let’s talk about your IT service needs.Gain insights and expertise on the topics shaping IT Transformation—visit InFocus....

マラリア インフォグラフィック

...マラリア流布地域であるサハラ砂漠以南アフリカ諸国への、社員派遣が増加社員に対しマラリア予防計画を実施したことにより、死亡率が70%減少サブサハラ・アフリカ(サハラ砂漠以南のアフリカ諸国)が、今後10年間で世界で最も成長度の高い地域になるとの予想(1)に備え、欧米諸国の企業を中心に、より多くの社員を派遣しています。それに伴い、該当地域への赴任者や出張者へのマラリアのリスクも高まる可能性があります。就労先における事故や病気に特化したコンサルティング企業であるPrevent(プリベント)による白書「Return on Prevention」には、マラ...


... for fiscal year 2007. To prevent a look-ahead bias, allcompanies were screened using fiscal year 2007 data (which wouldhave been available beginning of January 2009).Returns Comparison:Women on Boards and No Women on Boards...


...インターナショナルSOSは高品質な医療とトラベルセキュリティのアシスタンスサービスを提供いたします。 海外派遣者の就労環境に関する新調査報告を発表: 渡航前の健康と安全への対策が事業成功を後押しマラリア予防対策が、海外派遣者の死亡率を70%まで減少する可能性渡航前の健康診断が、海外派遣者交代の防止につながる渡航前の健康診断への投資が、2.5倍のコスト削減につながるこの度、インターナショナルSOS財団は、コンサルティング企業 Prevent(プリベント)とともに「社員...



... results for projects carried out in their countries, but some of these reports have beenfor fictitious projects2, so it is important that a system be created to prevent the falsificationof such information. If the database for TECRIS system in Japan...


... and Protective Measures to Prevent the Spread of Ebola to the United States"http://www.dhs.gov/news/2014/10/21/statement-secretary-johnson-travel-restrictions-and-protective-measures-prevent(アクセス日:2014 年 10 月 23 日)7Governor Andrew M. Cuomo. "Governor Cuomo...


Japan's Environmental Policy 日本の環境政策(改訂版)

... Agency, which is responsible for water resource development such as dam construction in major river systems in Japan, carries out related environmental activities such as aeration and installation of partitioning fences to prevent the growth of algae(注25...



..., hierarchical structure is not impossible and likes to improve on these structures, provided that certain cautions are met to prevent pigeonholing (see more on the Theory page and at #5).To initiate a dialogue or start a platform (WIKI) in order to achieve...



..., and How We Can Prevent It from Happening Again, Chicago: University of Chicago Press.Obstfeld, M, J C Shambaugh and A M Taylor (2004), "Monetary Sovereignty, Exchange Rates, and Capital Controls: The Trilemma in the Interwar Period", IMF Staff Papers 51(s1...


Spam and phishing in 2016

... attacks.Phishers often place fake pages on the servers of government bodies in Brazil. This is one of the methods used to prevent phishing URLs from ending up on blacklists. It also enhances the credibility in the eyes of the victim. In 2016, we registered...



... and Amir Sufi(2014)House of Debt: How They (and You) Caused the Great Recession, and How WeCan Prevent It from Happening Again, University Of Chicago Press, May3Standard and Poor's(2014)“As Subprime Auto Lending Heats Up, ABS Transactions Remain Adequately...



Study on Economic Partnership Projectsin Developing Countries in FY2014Study on the Makassar Toll-Road Projectin the Republic of IndonesiaFinal ReportFebruary 2015Prepared for:Ministry of Economy, Trade and IndustryErnst & Young ShinNihon LLCJapan Ex


...). WikiLeaks Dump: How to Prevent Yourself From Being Spied onThe CIA is allegedly using “weaponized” hacking tools to break into phones, televisions and other devices, according to documents released by WikiLeaks, once again raising major concerns about...


Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2015~2020 White Paper

... a network layer protocol it cannot prevent advanced security breaches on OSI layers that sit over the network layer.For example:Application layer attacks: Attacks performed at the application layer (OSI Layer 7) such as buffer overflow, viruses and malicious...


Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2010.2015

... a network layer protocol it cannot prevent advanced security breaches on OSI layers that sit over the network layer.For example:Application layer attacks: Attacks performed at the application layer (OSI Layer 7) such as buffer overflow, viruses and malicious...



... material injury to anindustry located in the first Member State, the otherMember State shall, at the written request of thefirst Member State examine the possibility of takingaction, consistent with its international obligations,to prevent material injury.8...

ヘイズ アジア給与ガイド西日本版

... a fundamental concern.In light of this talent deficiency, more and more employers are facing an uphill battle to prevent existing staff from departing, and as such are shifting their focus towards retention. One aspect of this is that companies are looking...

Who Has Your Back? Government Data Requests 2015

... is prohibited. If your data request draws attention to an ongoing violation of our terms of use, we will take action to prevent further abuse, including actions that may notify the user that we are aware of their misconduct.Disclose data retention policies...



  • mixiチェック

RSS Facebook Twitter メルマガ


        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30