What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2017-02-08 12:55:34 A Primer on IoT Security Risks (lien direct) IoT security risks include physical, network, software and encryption attacks that target the sensor, network and application layers of IoT systems.
securityintelligence.webp 2017-02-08 12:05:38 Keep Yourself and Your Organization Better Informed About Cybersecurity Trends (lien direct) IT professionals must stay informed and educate the users in their networks about the latest cybersecurity trends and threats.
securityintelligence.webp 2017-02-07 13:35:35 Voice Privacy in the Enterprise: Are You Listening? (lien direct) The EWF's Voice Privacy Alliance aims to help consumers enjoy the benefits and convenience of voice-enabled devices and avoid the security pitfalls.
securityintelligence.webp 2017-02-07 12:15:35 X-Force Red Launches in Latin America and Takes on the Evolution of Cybersecurity (lien direct) IBM's X-Force Red team delivers the offensive security capabilities organizations need to protect against and respond to advanced targeted attacks.
securityintelligence.webp 2017-02-07 10:40:36 The Upside of the Skills Gap: A Chance for More Women to Enter the Security Industry (lien direct) Women represent only 10 percent of the security industry. Closing the skills gap can help the IT industry fill the millions of empty security positions.
securityintelligence.webp 2017-02-06 13:45:36 Is it Time to Buy Cyber Insurance? (lien direct) To limit the potentially debilitating financial impact of a security breach, many companies opt to take out cyber insurance policies.
securityintelligence.webp 2017-02-06 13:00:38 Continuous Diagnostics and Mitigation: A Look Back and Preparing for Phase Three (lien direct) The DHS's Continuous Diagnostics and Mitigation (CDM) program outlines strategies to help companies address gaps in their cybersecurity architectures.
securityintelligence.webp 2017-02-06 12:30:37 New Approaches to Cybersecurity Drive IT Innovation (lien direct) To respond to ever-increasing cyberthreats, IT professionals have developed new security methods that drive sustained IT innovation.
securityintelligence.webp 2017-02-03 13:45:35 Highlights From the World Economic Forum\'s \'Global Risks Report 2017\' (lien direct) The lack of concern for cyber issues reflected in the World Economic Forum's "Global Risks Report 2017" speaks to a worldwide lack of security awareness.
securityintelligence.webp 2017-02-03 12:50:35 The Zero Trust Model for Living in a Hacked World (lien direct) The zero trust model requires IT managers to abandon the "trust but verify" concept and manage user access according to a strategy of least privilege.
securityintelligence.webp 2017-02-03 11:30:37 It\'s a Bird, It\'s a Plane - No, It\'s Your Data! Three Tips for Cloud-Bound Sensitive Data (lien direct) To move sensitive data securely to the cloud, establish a data-centric philosophy and approach to security and apply it across all platforms.
securityintelligence.webp 2017-02-02 13:40:34 Why 53 Percent of Banks Think Security Controls Negatively Impact Customer Experience (lien direct) The delicate balance between a seamless customer experience and quality security controls is one that online banking portals need to manage.
securityintelligence.webp 2017-02-02 13:05:34 Looking at the Bigger Picture for Your Information Security Program (lien direct) IT managers must understand how initiatives related to the information security program affect the business side of the organization.
securityintelligence.webp 2017-02-02 12:30:37 Is IoT Security an Oxymoron? (lien direct) As the Internet of Things continues to expand, IT leaders must prepare accordingly or find themselves vulnerable to countless IoT security threats. Guideline
securityintelligence.webp 2017-02-01 15:30:36 Increased Regulatory Compliance Is Choking the CISO (lien direct) CISOs and other business leaders are struggling to maintain regulatory compliance as government agencies continue to devise new, complicated laws. Guideline
securityintelligence.webp 2017-02-01 14:05:43 IBM Named a Leader in 2016 Gartner Magic Quadrant for Managed Security Services (MSSP) (lien direct) IBM was named a Leader in the 2016 Gartner Magic Quadrant for Managed Security Services due in large part to positive testimonials from IBM clients. Guideline
securityintelligence.webp 2017-02-01 14:05:39 Enterprise Intelligence Brief: Threat Hunting Takes Center Stage (lien direct) Threat hunting can help organizations transition from reactive to proactive defense strategies and start thinking like cybercriminals.
securityintelligence.webp 2017-01-31 15:40:34 IBM Report Finds Health Care Data at Growing Risk From Ransomware, Insiders and Third-Party Breaches (lien direct) A new report based on IBM MSS data revealed that ransomware, insider threats and third-party breaches plagued health care organizations in 2016.
securityintelligence.webp 2017-01-31 11:30:36 Securing SAP Systems, Your Company\'s \'Tree of Souls\' (lien direct) Like the Na'vi guarded their "Tree of Souls," the Onapsis Security Platform delivers the insights IT analysts need to protect their SAP systems.
securityintelligence.webp 2017-01-30 16:00:37 Secure SD-WAN: The First Step Toward Zero Trust Security (lien direct) A secure SD-WAN can help companies reduce costs, simplify cloud connectivity and secure their networks. This is the first step toward zero trust security.
securityintelligence.webp 2017-01-30 13:30:36 Two-Factor Authentication: A Little Goes a Long Way (lien direct) Online services are understandably reluctant to add steps to the login process, but a little two-factor authentication can significantly boost security.
securityintelligence.webp 2017-01-30 12:30:41 Proactively Protect Your IT Immune System With Security Operations and Response (lien direct) IBM's Security Operations and Response platform enables IT analysts to proactively hunt for threats and respond to incidents with advanced analytics.
securityintelligence.webp 2017-01-27 13:00:36 The Current State of IT Resilience (lien direct) According to a new report, organizations struggled to maintain IT resilience in 2016 due to challenges related to migration, downtime, the cloud and more
securityintelligence.webp 2017-01-27 12:30:35 Security Starts With People: IBM to Showcase Robust IAM Strategy at Gartner IAM Summit in London (lien direct) IBM plans to promote its conviction that security starts with people at the 2017 Gartner IAM Summit, set to kick off in London on March 6.
securityintelligence.webp 2017-01-26 16:00:37 Around the World With Zeus Sphinx: From Canada to Australia and Back (lien direct) For the first time, IBM X-Force Researchers reported Zeus Sphinx activity targeting banks and financial institutions in Canada and Australia.
securityintelligence.webp 2017-01-26 12:40:32 The Dark Web Marketplace: A Shopping Center for Attackers (lien direct) Cybercriminals are steeped in a culture of trading malicious tools. This Dark Web marketplace drives the evolution of the cyberthreat landscape.
securityintelligence.webp 2017-01-26 09:30:35 A Progress Report on Cybersecurity in Israel (lien direct) The CyberTech conference is a good introduction to cybersecurity in Israel, but the industry is booming throughout the country at an unprecedented rate.
securityintelligence.webp 2017-01-25 17:00:36 Crisis Leadership, Part 2: What Are We Learning? (lien direct) In addition to responding to threats in progress, crisis leadership involves rehearsing various responses to prepare for a data breach. Guideline
securityintelligence.webp 2017-01-25 13:00:37 Anatomy of an hVNC Attack (lien direct) Cybercriminals who rely on remote control tactics to commit financial fraud may use hidden virtual network computing (hVNC) modules to cover their tracks.
securityintelligence.webp 2017-01-25 11:50:34 Get Serious About Data Protection to Secure MongoDB (lien direct) MongoDB offered a set of security best practices to help users protect their databases from cybercriminals looking to exploit misconfigured servers.
securityintelligence.webp 2017-01-24 13:30:35 Hacked by a Kid?! A Story to Illustrate the State of Authentication Today (lien direct) A 6-year-old child ordered $250 worth of merchandise by using her sleeping mother's fingerprint to satisfy the authentication requirements on her phone.
securityintelligence.webp 2017-01-24 12:40:32 Creatures of Habit Give Security Operations Teams the Upper Hand in Fighting Cybercrime (lien direct) User behavior analytics solutions can help security operations teams analyze users' habits for anomalies that might expose a threat.
securityintelligence.webp 2017-01-24 10:35:31 Designer Wallet or Mobile Wallet: Which One Do You Carry? (lien direct) Many Indians deposited their cash into mobile wallet services after the government announced the demonitization of several high-value banknotes.
securityintelligence.webp 2017-01-23 15:00:35 IBM Plans to Acquire Agile 3 Solutions to Help Executives Manage Their Critical Data (lien direct) IBM recently announced its plan to acquire Agile 3 Solutions, a leader in business risk dashboarding and data visualization. Guideline
securityintelligence.webp 2017-01-23 13:00:36 An Evolving Threat: Ransomware in 2017 (lien direct) IT leaders must prepare to protect their environments from new types of ransomware in 2017, since the new year is sure to bring fresh threats. Guideline
securityintelligence.webp 2017-01-23 11:50:32 Perspectives on Securing Mobile and Social Business, 12 Months On (lien direct) The IT landscape has changed since we issued our paper on securing mobile and social business in late 2015. We revised our findings to reflect this shift.
securityintelligence.webp 2017-01-20 13:31:19 Tracking the Digital Transition in the White House (lien direct) As part of the digital transition in the White House, former President Barack Obama's social media records will be transferred to a separate archive.
securityintelligence.webp 2017-01-20 13:00:35 Application Security Testing: Resurgence of DAST for SDLC Integration and Scan Automation (lien direct) The sooner a vulnerability is found, the cheaper it is to fix. Developers can spot defects early by integrating application security testing into the SDLC.
securityintelligence.webp 2017-01-19 13:46:08 Is the CISO Reporting Structure Outdated? (lien direct) Many organizations are changing the CISO reporting structure to reflect growing influence of IT over other departments and domains.
securityintelligence.webp 2017-01-19 13:00:34 Expanding Threat Intelligence in IBM X-Force Exchange (lien direct) The Threat Feed Manager tool in X-Force Exchange enables analysts to integrate threat intelligence data into collections to share with the IT community.
securityintelligence.webp 2017-01-19 12:05:34 \'In Security\' Web Comic, Episode 005: Protecting the Castle (lien direct) IBM's security sages have built an immune system that grows with your kingdom, protecting the castle from all kinds of cyberthreats.
securityintelligence.webp 2017-01-18 14:05:29 10 Key Findings From the Ponemon Institute\'s Mobile & IoT Application Security Testing Study (lien direct) According to a recent Ponemon study, many organizations fail to conduct application security testing despite concerns about potential data breaches.
securityintelligence.webp 2017-01-18 13:00:34 Five Ways to Be a More Effective CISO in 2017 (lien direct) Shifts in the cybersecurity and business landscapes will introduce many additional changes to the ever-evolving role of the CISO in 2017.
securityintelligence.webp 2017-01-18 11:00:34 Securing Human Endpoints Through Cyber Situational Awareness (lien direct) Humans represent the weakest link in the cybersecurity chain. An effective defense strategy starts and ends with cyber situational awareness.
securityintelligence.webp 2017-01-17 13:20:36 Going Inside an Arbitrary Kernel Write Vulnerability in the Nexus 9 (lien direct) The IBM X-Force Application Security Research Team discovered an arbitrary write vulnerability in Nexus 9's kernel, putting application data at risk.
securityintelligence.webp 2017-01-17 12:35:39 Applying Machine Learning to Improve Your Intrusion Detection System (lien direct) Security analysts can train intelligent intrusion detection systems to distinguish between normal and malicious traffic by creating generic data sets.
securityintelligence.webp 2017-01-17 10:55:30 Know Your Security Loopholes to Outsmart Lurking Cyberthreats (lien direct) IT managers must know what types of data cybercriminals covet to close any security loopholes that might lead to a security breach. Guideline
securityintelligence.webp 2017-01-16 14:10:31 The Holes in Your Knows (lien direct) Eliminate holes in your knows by monitoring all privileged access and tying any questionable activity to auditable executions.
securityintelligence.webp 2017-01-16 12:50:30 The Most Unnerving Security Trends to Prepare for in 2017 (lien direct) To stay ahead of increasingly sophisticated cyberthreats, CISOs and IT professionals must pay attention to the top security trends emerging in 2017.
securityintelligence.webp 2017-01-16 11:30:32 Too Many Passwords: Is the End in Sight? (lien direct) Will passwords become things of the past in 2017? Today, organizations tasked with managing too many passwords are at risk of phishing and malware attacks.
Last update at: 2024-07-15 11:08:22
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter