Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-08 12:55:34 |
A Primer on IoT Security Risks (lien direct) |
IoT security risks include physical, network, software and encryption attacks that target the sensor, network and application layers of IoT systems.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-08 12:05:38 |
Keep Yourself and Your Organization Better Informed About Cybersecurity Trends (lien direct) |
IT professionals must stay informed and educate the users in their networks about the latest cybersecurity trends and threats.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-07 13:35:35 |
Voice Privacy in the Enterprise: Are You Listening? (lien direct) |
The EWF's Voice Privacy Alliance aims to help consumers enjoy the benefits and convenience of voice-enabled devices and avoid the security pitfalls.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-07 12:15:35 |
X-Force Red Launches in Latin America and Takes on the Evolution of Cybersecurity (lien direct) |
IBM's X-Force Red team delivers the offensive security capabilities organizations need to protect against and respond to advanced targeted attacks.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-07 10:40:36 |
The Upside of the Skills Gap: A Chance for More Women to Enter the Security Industry (lien direct) |
Women represent only 10 percent of the security industry. Closing the skills gap can help the IT industry fill the millions of empty security positions.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-06 13:45:36 |
Is it Time to Buy Cyber Insurance? (lien direct) |
To limit the potentially debilitating financial impact of a security breach, many companies opt to take out cyber insurance policies.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-06 13:00:38 |
Continuous Diagnostics and Mitigation: A Look Back and Preparing for Phase Three (lien direct) |
The DHS's Continuous Diagnostics and Mitigation (CDM) program outlines strategies to help companies address gaps in their cybersecurity architectures.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-06 12:30:37 |
New Approaches to Cybersecurity Drive IT Innovation (lien direct) |
To respond to ever-increasing cyberthreats, IT professionals have developed new security methods that drive sustained IT innovation.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-03 13:45:35 |
Highlights From the World Economic Forum\'s \'Global Risks Report 2017\' (lien direct) |
The lack of concern for cyber issues reflected in the World Economic Forum's "Global Risks Report 2017" speaks to a worldwide lack of security awareness.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-03 12:50:35 |
The Zero Trust Model for Living in a Hacked World (lien direct) |
The zero trust model requires IT managers to abandon the "trust but verify" concept and manage user access according to a strategy of least privilege.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-03 11:30:37 |
It\'s a Bird, It\'s a Plane - No, It\'s Your Data! Three Tips for Cloud-Bound Sensitive Data (lien direct) |
To move sensitive data securely to the cloud, establish a data-centric philosophy and approach to security and apply it across all platforms.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-02 13:40:34 |
Why 53 Percent of Banks Think Security Controls Negatively Impact Customer Experience (lien direct) |
The delicate balance between a seamless customer experience and quality security controls is one that online banking portals need to manage.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-02 13:05:34 |
Looking at the Bigger Picture for Your Information Security Program (lien direct) |
IT managers must understand how initiatives related to the information security program affect the business side of the organization.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-02 12:30:37 |
Is IoT Security an Oxymoron? (lien direct) |
As the Internet of Things continues to expand, IT leaders must prepare accordingly or find themselves vulnerable to countless IoT security threats.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-01 15:30:36 |
Increased Regulatory Compliance Is Choking the CISO (lien direct) |
CISOs and other business leaders are struggling to maintain regulatory compliance as government agencies continue to devise new, complicated laws.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-01 14:05:43 |
IBM Named a Leader in 2016 Gartner Magic Quadrant for Managed Security Services (MSSP) (lien direct) |
IBM was named a Leader in the 2016 Gartner Magic Quadrant for Managed Security Services due in large part to positive testimonials from IBM clients.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-01 14:05:39 |
Enterprise Intelligence Brief: Threat Hunting Takes Center Stage (lien direct) |
Threat hunting can help organizations transition from reactive to proactive defense strategies and start thinking like cybercriminals.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-31 15:40:34 |
IBM Report Finds Health Care Data at Growing Risk From Ransomware, Insiders and Third-Party Breaches (lien direct) |
A new report based on IBM MSS data revealed that ransomware, insider threats and third-party breaches plagued health care organizations in 2016.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-31 11:30:36 |
Securing SAP Systems, Your Company\'s \'Tree of Souls\' (lien direct) |
Like the Na'vi guarded their "Tree of Souls," the Onapsis Security Platform delivers the insights IT analysts need to protect their SAP systems.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-30 16:00:37 |
Secure SD-WAN: The First Step Toward Zero Trust Security (lien direct) |
A secure SD-WAN can help companies reduce costs, simplify cloud connectivity and secure their networks. This is the first step toward zero trust security.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-30 13:30:36 |
Two-Factor Authentication: A Little Goes a Long Way (lien direct) |
Online services are understandably reluctant to add steps to the login process, but a little two-factor authentication can significantly boost security.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-30 12:30:41 |
Proactively Protect Your IT Immune System With Security Operations and Response (lien direct) |
IBM's Security Operations and Response platform enables IT analysts to proactively hunt for threats and respond to incidents with advanced analytics.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-27 13:00:36 |
The Current State of IT Resilience (lien direct) |
According to a new report, organizations struggled to maintain IT resilience in 2016 due to challenges related to migration, downtime, the cloud and more
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-27 12:30:35 |
Security Starts With People: IBM to Showcase Robust IAM Strategy at Gartner IAM Summit in London (lien direct) |
IBM plans to promote its conviction that security starts with people at the 2017 Gartner IAM Summit, set to kick off in London on March 6.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-26 16:00:37 |
Around the World With Zeus Sphinx: From Canada to Australia and Back (lien direct) |
For the first time, IBM X-Force Researchers reported Zeus Sphinx activity targeting banks and financial institutions in Canada and Australia.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-26 12:40:32 |
The Dark Web Marketplace: A Shopping Center for Attackers (lien direct) |
Cybercriminals are steeped in a culture of trading malicious tools. This Dark Web marketplace drives the evolution of the cyberthreat landscape.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-26 09:30:35 |
A Progress Report on Cybersecurity in Israel (lien direct) |
The CyberTech conference is a good introduction to cybersecurity in Israel, but the industry is booming throughout the country at an unprecedented rate.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-25 17:00:36 |
Crisis Leadership, Part 2: What Are We Learning? (lien direct) |
In addition to responding to threats in progress, crisis leadership involves rehearsing various responses to prepare for a data breach.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-25 13:00:37 |
Anatomy of an hVNC Attack (lien direct) |
Cybercriminals who rely on remote control tactics to commit financial fraud may use hidden virtual network computing (hVNC) modules to cover their tracks.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-25 11:50:34 |
Get Serious About Data Protection to Secure MongoDB (lien direct) |
MongoDB offered a set of security best practices to help users protect their databases from cybercriminals looking to exploit misconfigured servers.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-24 13:30:35 |
Hacked by a Kid?! A Story to Illustrate the State of Authentication Today (lien direct) |
A 6-year-old child ordered $250 worth of merchandise by using her sleeping mother's fingerprint to satisfy the authentication requirements on her phone.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-24 12:40:32 |
Creatures of Habit Give Security Operations Teams the Upper Hand in Fighting Cybercrime (lien direct) |
User behavior analytics solutions can help security operations teams analyze users' habits for anomalies that might expose a threat.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-24 10:35:31 |
Designer Wallet or Mobile Wallet: Which One Do You Carry? (lien direct) |
Many Indians deposited their cash into mobile wallet services after the government announced the demonitization of several high-value banknotes.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-23 15:00:35 |
IBM Plans to Acquire Agile 3 Solutions to Help Executives Manage Their Critical Data (lien direct) |
IBM recently announced its plan to acquire Agile 3 Solutions, a leader in business risk dashboarding and data visualization.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-23 13:00:36 |
An Evolving Threat: Ransomware in 2017 (lien direct) |
IT leaders must prepare to protect their environments from new types of ransomware in 2017, since the new year is sure to bring fresh threats.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-23 11:50:32 |
Perspectives on Securing Mobile and Social Business, 12 Months On (lien direct) |
The IT landscape has changed since we issued our paper on securing mobile and social business in late 2015. We revised our findings to reflect this shift.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-20 13:31:19 |
Tracking the Digital Transition in the White House (lien direct) |
As part of the digital transition in the White House, former President Barack Obama's social media records will be transferred to a separate archive.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-20 13:00:35 |
Application Security Testing: Resurgence of DAST for SDLC Integration and Scan Automation (lien direct) |
The sooner a vulnerability is found, the cheaper it is to fix. Developers can spot defects early by integrating application security testing into the SDLC.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-19 13:46:08 |
Is the CISO Reporting Structure Outdated? (lien direct) |
Many organizations are changing the CISO reporting structure to reflect growing influence of IT over other departments and domains.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-19 13:00:34 |
Expanding Threat Intelligence in IBM X-Force Exchange (lien direct) |
The Threat Feed Manager tool in X-Force Exchange enables analysts to integrate threat intelligence data into collections to share with the IT community.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-19 12:05:34 |
\'In Security\' Web Comic, Episode 005: Protecting the Castle (lien direct) |
IBM's security sages have built an immune system that grows with your kingdom, protecting the castle from all kinds of cyberthreats.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-18 14:05:29 |
10 Key Findings From the Ponemon Institute\'s Mobile & IoT Application Security Testing Study (lien direct) |
According to a recent Ponemon study, many organizations fail to conduct application security testing despite concerns about potential data breaches.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-18 13:00:34 |
Five Ways to Be a More Effective CISO in 2017 (lien direct) |
Shifts in the cybersecurity and business landscapes will introduce many additional changes to the ever-evolving role of the CISO in 2017.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-18 11:00:34 |
Securing Human Endpoints Through Cyber Situational Awareness (lien direct) |
Humans represent the weakest link in the cybersecurity chain. An effective defense strategy starts and ends with cyber situational awareness.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-17 13:20:36 |
Going Inside an Arbitrary Kernel Write Vulnerability in the Nexus 9 (lien direct) |
The IBM X-Force Application Security Research Team discovered an arbitrary write vulnerability in Nexus 9's kernel, putting application data at risk.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-17 12:35:39 |
Applying Machine Learning to Improve Your Intrusion Detection System (lien direct) |
Security analysts can train intelligent intrusion detection systems to distinguish between normal and malicious traffic by creating generic data sets.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-17 10:55:30 |
Know Your Security Loopholes to Outsmart Lurking Cyberthreats (lien direct) |
IT managers must know what types of data cybercriminals covet to close any security loopholes that might lead to a security breach.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-16 14:10:31 |
The Holes in Your Knows (lien direct) |
Eliminate holes in your knows by monitoring all privileged access and tying any questionable activity to auditable executions.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-16 12:50:30 |
The Most Unnerving Security Trends to Prepare for in 2017 (lien direct) |
To stay ahead of increasingly sophisticated cyberthreats, CISOs and IT professionals must pay attention to the top security trends emerging in 2017.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-01-16 11:30:32 |
Too Many Passwords: Is the End in Sight? (lien direct) |
Will passwords become things of the past in 2017? Today, organizations tasked with managing too many passwords are at risk of phishing and malware attacks.
|
|
|
|