「prevent」の検索結果 | 調査のチカラ



日 以降のデータに限定
日 以前のデータに限定





  • ソート条件:
  • 表示件数   :
  • 表示項目   :
  • 検索対象   :
  • 注目レベル:


... delivers actionable information about known and unknown threats regardless of the infection’s source, entry vector or OS of the device. It arms responders with definitive evidence so they can rapidly prevent loss on high-risk devices while blocking activity...


Internet-wide efforts to fight email phishing are working

... don't understand how any of these protocols will have a lasting impact on larger problem of phishing. Maybe you could help me with that? What they seem to do, under the best of circumstances, is prevent spoofing of the domain in one small technical...

2017年1月24日Keeper Securityフィードバック数:0セキュリティ/ネットワーク

What the Most Common Passwords of 2016 List Reveals

..., but their efforts are weak at best. Dictionary-based password crackers know to look for sequential key variations. At best, it sets them back only a few seconds.Email providers don’t appear to be working all that hard to prevent the use of their services for spam...


HP Study Reveals Smartwatches Vulnerable to Attack

... updates were signed to help prevent the installation of contaminated firmware. While malicious updates cannot be installed, lack of encryption allows the files to be downloaded and analyzed.Privacy Concerns: All smartwatches collected some form of personal...


Gartner Says Worldwide Security Market to Grow 8.7 Percent in 2013

... to either prevent or detect these newly emergent attacks and persistent penetration strategies. This layered approach is typical of many enterprise organizations and is often managed in independent ways to accomplish stated security goals, namely, detect...

2017年2月8日blancco technology groupフィードバック数:0セキュリティ/ネットワーク

Delayed Threat Detection & Breach Notifications Intensify Regulatory Challenges of Data Protection

... and six months to detect a security threat and 5 percent only detect a threat when notified by external parties.While threat detection plays a vital role in helping organizations prevent data loss/theft, it’s equally important for organizations to notify...


hotel.info Check: Hotels between spotless and dirty

... of European hotels can also help to prevent unpleasant surprises such as in Paris (7.63). There are, of course, many excellent hotels in the capital city but there are also hoteliers who do not pay much attention to cleanliness.It is essential to always...



... further stimulate demand but this may not be enough to prevent vacancies from rising slightlyNew facilities in the Greater Osaka region and Fukuoka reported strong demand in Q2 2014Q2 2014 saw the completion of just one new logistics facility...


2016 Notorious Markets List

... counterfeiting in online marketplaces,” said Froman. “The 2016 List underscores the need for accountable governments everywhere to take on these forms of piracy and counterfeiting at every stage of the global supply chain to prevent final products that put health...

2014年11月26日AV-TEST Instituteフィードバック数:0セキュリティ/ネットワーク海外

Self-Protection for Antivirus Software

... Layout Randomization stands for a shuffling of memory sectors, making it more difficult to exploit security gaps in computer systems. Using ASLR, stack addresses are randomly allocated to applications. This is intended to prevent, or at least impede...

2016年3月2日Brand Financeフィードバック数:0マーケティング

The World’s Most Powerful Brands 2016

... by German regulators for attempting to prevent retailers from discounting its products. It was also accused of colluding in censorship for trying to prevent dissident Chinese artist Ai Wei Wei from using Lego in his work. Lego has since reversed its policy...

2015年6月5日Huffington Postフィードバック数:0ライフスタイル海外


... to announce how to further prevent the spread of Middle East Respiratory Syndrome (MERS) at the government complex in Seoul, South Korea, Sunday, May 31, 2015. China on Friday confirmed its first case of MERS in a South Korean businessman who ignored...


Verizon 2016 Data Breach Investigations Report

... key logging.Use of the credentials for further attacks, for example, to log into third-party websites like banking or retail sites."The goal is to understand how the cybercriminals operate," said Sartin. "By knowing their patterns, we can best prevent...

Infographic: The power game: Thai junta levels up its power

... be held responsible for actions to prevent threats to national security.14. Section 14 of NCPO Order 3/2015 to impose Section 44 does not prohibit affected parties from claiming compensation from the government in accordance with the Public Officials...



... need to not only reduce and prevent supply chain risks, such as supply shortages, production disruptions or quality issues, but also to better leverage segmentation and cost-to-serve analysis programs for more profitable operations. The lynchpin...


IT Transformation Maturity Curve(ITトランスフォーメーション成熟度曲線)

... would like to change your preferred language or country of origin, please click here. Detect, investigate, and respond to advanced threats. Confirm and manage identities. Ultimately, prevent IP theft, fraud, and cybercrime.Explore products and solutions...

2013年8月8日IC Insightsフィードバック数:0製造業/エレクトロニクス海外

IC Insights Reveals Big Changes to 1H13 Top 20 Semiconductor Supplier Ranking

... conversion issues. However, the company’s 3Q13/2Q13 guidance is for a 22% surge in sales, a significant rebound but one that still may not prevent the company from posting another full-year decline in sales in 2013 (AMD registered a steep 17% sales decline...



... needs. However, reducing the consumption of fossil fuel is asked in order to prevent the global warming and to suppress the rise of agricultural production cost. As a result of the price competitiveness of heat pump (HP) with high energy efficiency...



...家保護と両立する自由料金の選択促進策が求められる。この手段としては、自由料金から規制料金への回帰を認めることや自由化への懸念を解消することが有効である。A large number of residential customers do not choose market based tariffs under existence of regulated retail tariffs in Europe, which could prevent retail competition. It is important to understand...


Mobile Threat Report Q4 2012

...Callisto Group Published Apr 2017 The Callisto Group threat actor's primary interest is gathering foreign and security policy intelligence. In early 2016, they began sending highly targeted phishing emails... Ransomware How to prevent, predict...


April 2014 Web Server Survey

... this is not Microsoft's largest ever market share (it reached 37% in October 2007), this is the closest it has ever been to Apache's leading market share, leaving Apache only 4.7 points ahead. Although Apache gained 6.9 million sites, this was not enough to prevent its...

マラリア インフォグラフィック

...マラリア流布地域であるサハラ砂漠以南アフリカ諸国への、社員派遣が増加社員に対しマラリア予防計画を実施したことにより、死亡率が70%減少サブサハラ・アフリカ(サハラ砂漠以南のアフリカ諸国)が、今後10年間で世界で最も成長度の高い地域になるとの予想(1)に備え、欧米諸国の企業を中心に、より多くの社員を派遣しています。それに伴い、該当地域への赴任者や出張者へのマラリアのリスクも高まる可能性があります。就労先における事故や病気に特化したコンサルティング企業であるPrevent(プリベント)による白書「Return on Prevention」には、マラ...



New Digital Universe Study Reveals Big Data Gap: Less Than 1% of World’s Data is Analyzed; Less Than 20% is Protected

.... Ultimately, prevent IP theft, fraud, and cybercrime.Explore products and solutions from RSA. Let’s talk about your IT service needs.Gain insights and expertise on the topics shaping IT Transformation—visit InFocus....


リレーショナルデータベースが新型データ性能に対応するため進化中 (原題: Relational Databases are Evolving to Support New Data Capabilities)

... cost and complexity and poses greater risk for the enterprise.”Some findings from the study are:Developers’ NoSQL freedom carries a cost. More than half—52%—of respondents said they were unable to prevent developers from deploying new applications...


...インターナショナルSOSは高品質な医療とトラベルセキュリティのアシスタンスサービスを提供いたします。 海外派遣者の就労環境に関する新調査報告を発表: 渡航前の健康と安全への対策が事業成功を後押しマラリア予防対策が、海外派遣者の死亡率を70%まで減少する可能性渡航前の健康診断が、海外派遣者交代の防止につながる渡航前の健康診断への投資が、2.5倍のコスト削減につながるこの度、インターナショナルSOS財団は、コンサルティング企業 Prevent(プリベント)とともに「社員...


Overall Report Real-World Protection Test 2017 (February - June)

....If these features are perfectly coordinated with the signature-based and heuristic detection, theprotection provided against threats increases.In this test, all protection features of the product can be used to prevent infection - not just signaturesor heuristic...

2015年10月14日University of Cambridgeフィードバック数:0セキュリティ/ネットワーク海外

Security Metrics for the Android Ecosystem

... the Verify Appsfeature on the smartphone at installation time, and by anapp sandbox on the smartphone during execution. The bestplace to prevent attacks is by sandboxing the app duringexecution, since all three attack vectors can be prevented atthis level...


Japan's Environmental Policy 日本の環境政策(改訂版)

... Agency, which is responsible for water resource development such as dam construction in major river systems in Japan, carries out related environmental activities such as aeration and installation of partitioning fences to prevent the growth of algae(注25...



..., hierarchical structure is not impossible and likes to improve on these structures, provided that certain cautions are met to prevent pigeonholing (see more on the Theory page and at #5).To initiate a dialogue or start a platform (WIKI) in order to achieve...


Spam and phishing in 2016

... attacks.Phishers often place fake pages on the servers of government bodies in Brazil. This is one of the methods used to prevent phishing URLs from ending up on blacklists. It also enhances the credibility in the eyes of the victim. In 2016, we registered...



..., and How We Can Prevent It from Happening Again, Chicago: University of Chicago Press.Obstfeld, M, J C Shambaugh and A M Taylor (2004), "Monetary Sovereignty, Exchange Rates, and Capital Controls: The Trilemma in the Interwar Period", IMF Staff Papers 51(s1...


... and rendered wide open to intrusion by the U.S. government – at least. (Featuring comments from Barracuda’s Slawek Ligier). WikiLeaks Dump: How to Prevent Yourself From Being Spied onThe CIA is allegedly using “weaponized” hacking tools to break into phones...


Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2010.2015

... a network layer protocol it cannot prevent advanced security breaches on OSI layers that sit over the network layer.For example:Application layer attacks: Attacks performed at the application layer (OSI Layer 7) such as buffer overflow, viruses and malicious...


Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2015~2020 White Paper

... a network layer protocol it cannot prevent advanced security breaches on OSI layers that sit over the network layer.For example:Application layer attacks: Attacks performed at the application layer (OSI Layer 7) such as buffer overflow, viruses and malicious...

Who Has Your Back? Government Data Requests 2015

... is prohibited. If your data request draws attention to an ongoing violation of our terms of use, we will take action to prevent further abuse, including actions that may notify the user that we are aware of their misconduct.Disclose data retention policies...



  • mixiチェック

RSS Facebook Twitter メルマガ


1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31