What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2016-10-03 12:50:51 Celebrating the Progress of National Cyber Security Awareness Month (lien direct) October is National Cyber Security Awareness Month, an initiative started in 2004 to educate citizens and businesses about the importance of cybersecurity.
securityintelligence.webp 2016-09-30 13:26:21 Why Cryptography Is the New Gold for Banking and Blockchain (lien direct) Blockchain and Cryptography: The New Gold Standard Over the past 200 years, the role of gold in international trade has been undeniable as a means to standardize prices across currencies and secure payments across borders. Before 1875, global financial systems based prices on the amount of gold held in coins, which could then be exchanged […]
securityintelligence.webp 2016-09-30 13:25:16 Pros and Cons of Building and Maintaining In-House Pen Testing Capability (lien direct) Security leaders must weigh the convenience and speed of in-house pen testing against the cost of maintaining a team to conduct security tests. Guideline
securityintelligence.webp 2016-09-29 11:41:23 IDaaS News: Cloud IAM Is a Game Changer for the CIO\'s Office at IBM (lien direct) If you are burdened with an expensive legacy IAM environment, you are not alone. Read how IBM's office of the CIO eliminated IAM challenges with IDaaS.
securityintelligence.webp 2016-09-29 09:02:57 Protected API Calls and String Constants: Looting Dridex\'s Candy Box (lien direct) Raiding Dridex’s Candy Jar When I was a kid, my mom would give my brothers and me a weekly allowance to buy candy. It was about the equivalent of $2, and if used prudently was just about enough to buy an ice cream bar and a few gummy bears. Some weeks, I’d go for packets […]
securityintelligence.webp 2016-09-28 13:17:06 What Is So Insecure About Cloud? Demystifying Cloud Security Transformation (lien direct) Enterprise IT organizations must establish a clearly defined cloud strategy to navigate the many challenges related to cloud security.
securityintelligence.webp 2016-09-28 07:04:46 Automate Security Investigation and Remediation With External Threat Intelligence (lien direct) The PassiveTotal app integrates threat intelligence with internet infrastructure data to help security teams speed up security incident investigations.
securityintelligence.webp 2016-09-27 11:31:45 Security Intelligence and Analytics: A Look Forward (lien direct) Clients are becoming more comfortable using cloud-delivered security intelligence services, according to offering managers Matt Carle and Chris Collard.
securityintelligence.webp 2016-09-27 07:10:25 Is Cognitive Security the Answer to the Massive Cybersecurity Skills Gap in India? (lien direct) The cybersecurity skills gap in India is especially worrisome given the increased rate of cyberattacks against businesses and government agencies.
securityintelligence.webp 2016-09-26 15:15:36 UK Universities Make Rich Targets for Ransomware Attacks (lien direct) Almost two-thirds of British universities fell victim to ransomware attacks in the past year, and the trend shows no signs of slowing down.
securityintelligence.webp 2016-09-26 13:10:49 10 IT Security Best Practices to Protect Your Social Media Reputation - and Your Birthday Party (lien direct) It was a birthday I’ll never forget. I know what you’re thinking: close friends, colorful streamers, a big birthday cake and Katy Perry’s “Birthday” softly playing the background. Nothing could be further from the truth. My quiet birthday dinner at a casual restaurant was interrupted by the rapid buzz of numerous emails being sent to […]
securityintelligence.webp 2016-09-26 13:09:00 Don\'t Trade One Security Analytics Platform Problem for Another (lien direct) I haven’t seen much love lately for security information and event management (SIEM). To steal a phrase from Gartner, the security analytics platform seems to have entered the “trough of disillusionment.” But in deploying alternatives, some enterprises may be trading one problem for another. SIEM is great in concept. These tools were introduced about a […]
securityintelligence.webp 2016-09-23 12:38:51 Biometric Authentication: Finding a Balance Between UX and IT Security (lien direct) When it comes to authentication, most security professionals see it as a necessary evil. It provides security at the expense of the end user’s desire for a frictionless experience. That way of thinking, however, was challenged at the Opus Research Intelligent Authentication 2016 conference. The two-day event made a point to highlight authentication not only […]
securityintelligence.webp 2016-09-23 12:36:16 Dissecting a Hacktivist\'s DDoS Tool: Saphyra Revealed (lien direct) Distributed denial-of-service (DDoS) attacks have been all over the news in recent months, with hacktivist groups taking major targets completely offline. According to IBM Managed Security Services data, the vast majority of DDoS attacks come in one of two flavors: SYN flood attacks, in which bad actors send multiple SYN requests to a victim’s webserver […]
securityintelligence.webp 2016-09-22 12:43:01 In Prevention We Trust? When and How to Use Endpoint Detection and Response (lien direct) Over the last few years, there has been a lot of talk about next-generation endpoint security and prevention tools versus endpoint detection and response solutions. Many clients ask the same questions about bolstering their security posture and balance budgets, including where to start, what to augment, what to replace and, most importantly, where to invest. […]
securityintelligence.webp 2016-09-22 12:42:23 Security in Banking: Are You Facing the Right Direction? (lien direct) The financial industry’s increasing dependence on advanced technologies has two major implications. First, the financial companies that adopt these technologies are able to leverage new and improved services, solve legacy issues and introduce competitive differentiation as a result. Second, the increased complexity of these systems creates more potential weak spots for cybercriminals to exploit. It […]
securityintelligence.webp 2016-09-21 14:35:21 \'In Security\' Web Comic, Episode 001: Pandapocalypse Strikes Again (lien direct) This week, the "In Security" crew responds to a panda-themed ransomware attack that is holding EveryApp's marketing system hostage.
securityintelligence.webp 2016-09-21 14:20:09 The Growing Threat of Cyber Extortion (lien direct) In the shadowy world of security threats and bad actors, cyber extortion is a growing trend. Cybercriminals are taking advantage of the vulnerability of intellectual property, threatening to release potentially embarrassing information and encrypting data to render it useless to the rightful owners, among other sinister practices. Unlike the risks associated with more traditional cybertheft, […]
securityintelligence.webp 2016-09-21 14:18:57 Anonymous Unleashes Gold Medal DDoS Tools (lien direct) The dust, waves and jubilation have settled on the sports festivities of this past summer. Since we’re in the business of cybersecurity, let’s reflect on one of the malicious activities that attempted to derail focus from this spirited event. Going into the games, many analysts expected the event to be marred by cybercriminal activity spanning […]
securityintelligence.webp 2016-09-20 16:43:02 No Business Is Too Small for SMB Cybersecurity (lien direct) Smaller businesses, like the HVAC company that caused the Target penetration in 2013, often think they are too small to be security targets, but SMB cybersecurity can have big implications. Size doesn’t matter as long as your firm has something of value that someone thinks is worth stealing, or a connection that someone thinks is […]
securityintelligence.webp 2016-09-20 14:04:07 Meanwhile in Britain, Qadars v3 Hardens Evasion, Targets 18 UK Banks (lien direct) Co-authored by Hanan Natan. IBM X-Force Research reported that the operators of the Qadars Trojan have been progressively updating the malware’s defenses and tailoring its configurations to target 18 banks in the U.K. In addition to its recent U.K. activity, the researchers found that Qadars campaigns launched in early September 2016 mainly targeted banks in […]
securityintelligence.webp 2016-09-20 07:15:37 What I Learned About Smartphone Dependency on a Himalayan Trek (lien direct) As smartphone use skyrockets in India, so does the threat of cyberattacks against Indian government agencies, banks, businesses and individual users.
securityintelligence.webp 2016-09-19 14:05:20 Podcast: Data Security Insights From a Health Care Insider (lien direct) In this podcast, Michael Ash shares data security insights and actionable advice on how health care organizations can face their PHI protection challenges.
securityintelligence.webp 2016-09-19 14:00:26 Threats Driving You Nuts? Try Threat Hunting With Sqrrl (lien direct) Sqrrl enables security professionals to detect and analyze threats that slip through the cracks of other threat hunting solutions.
securityintelligence.webp 2016-09-19 13:53:47 Tame the Dangerous Combination of Mobile and Cloud With EMM and a CASB (lien direct) Many security analysts use either an EMM solution or CASB to protect their enterprise, but few recognize the importance of deploying both.
securityintelligence.webp 2016-09-16 12:35:49 Quantum Computing Is Coming for Your Current Crypto (lien direct) Quantum computing promises to overhaul the information security industry. How can security teams compete with machines capable of decoding any encryption?
securityintelligence.webp 2016-09-16 11:30:21 The Trump Security Platform: Maintaining the GOP Status Quo (lien direct) The Trump security platform views government regulation critically while also assigning high priority to national security regulations.
securityintelligence.webp 2016-09-16 11:30:18 The Clinton Security Platform: Addressing the Future of Tech (lien direct) The Clinton security platform may be light on cybersecurity, but the presidential candidate has a lot to say about the future of technology and innovation.
securityintelligence.webp 2016-09-15 12:05:15 Security Interns Help to Create a Global IBM Hacking Competition (lien direct) A group of interns collaborated with experts on the IBM Managed Security Services team to create a global IBM hacking competition.
securityintelligence.webp 2016-09-15 11:05:16 Hey Dridex, Tu Runā Latviski? (lien direct) IBM X-Force Research reported that Dridex recently conducted attacks in unlikely areas, such as Latvia, Lithuania, Estonia and Ukraine.
securityintelligence.webp 2016-09-14 09:05:17 IBM MaaS360 Goes Global to Keep Data Local (lien direct) MaaS360 empowers organizations to fully enable, manage and secure their mobile devices, apps, docs and data on a global scale.
securityintelligence.webp 2016-09-14 08:55:14 Cloud: To Adopt or Not to Adopt? (lien direct) Cloud adoption can help optimize costs, but it also imposes constraints due to local and global regulations, and introduces security concerns.
securityintelligence.webp 2016-09-14 08:25:14 The Chief Trust Officer and the Need for Corporate Trust (lien direct) Corporate trust is a key differentiator in 2016. The CTrO maintains this trust by ensuring that customer data is being handled appropriately.
securityintelligence.webp 2016-09-13 12:30:17 Use a Malware Simulator to Better Defend Against Ransomware (lien direct) A malware simulator like the Shinosec ShinoLocker suite can help penetration testers understand how malware works and practice defending their systems.
securityintelligence.webp 2016-09-13 12:00:33 Is Your Database as Secure as It Should Be? (lien direct) It's important for an organization to leverage reliable data protection solutions to secure a database from both malicious and unintentional threats.
securityintelligence.webp 2016-09-13 11:30:17 Threat Intelligence: Is Your Current Capability Comprehensive? (lien direct) While many threat intelligence capabilities focus on delivering information to lower-tier analysts, an effective solution extends right up to the CISO.
securityintelligence.webp 2016-09-12 14:50:15 The CASB Knows: Lifting the Cloud App Visibility Fog (lien direct) A cloud access security broker (CASB) can help security leaders manage the use of cloud-based apps to benefit both the enterprise and its employees. Guideline
securityintelligence.webp 2016-09-12 14:40:17 Breaking Out the Boy in the Bubble: The Security Immune System for Data Protection (lien direct) A single breach is all it takes to wreak havoc on an organization that relies solely on perimeter controls for critical data protection.
securityintelligence.webp 2016-09-09 11:55:14 VBA Macro Malware Jumping on the Ransomware Bandwagon (lien direct) IBM observed a spike in malware activity that uses Visual Basic for Applications (VBA) macros to deliver malicious attachments.
securityintelligence.webp 2016-09-09 09:50:13 What a WWII Mathematician Might See When Looking at Your Critical IT Assets (lien direct) Instead of pouring resources into total security, professionals should focus on protecting critical IT assets and strengthening their weak spots.
securityintelligence.webp 2016-09-08 14:00:29 IBM Named a Leader in 2016 Forrester Wave for Managed Security Services (lien direct) IBM Security is among those that lead the pack in a recent assessment of 11 providers in "The Forrester Wave for Managed Security Services, Q3 2016." Guideline
securityintelligence.webp 2016-09-08 11:50:28 Credit Cards: Risky Business or Safe Bet? (lien direct) New regulations and the increasing threat of fraud have motivated financial institutions, merchants and consumers to rethink how they handle credit cards.
securityintelligence.webp 2016-09-08 10:30:28 Keeping the Lights On: Security Trends in the Energy and Utilities Industry (lien direct) The energy and utilities industry is built on a highly regulated framework - but that doesn't mean it's immune to the threat of a cyberattack.
securityintelligence.webp 2016-09-07 12:00:29 iOS 10 and macOS Sierra: Five Factoids for IT (lien direct) As Apple prepares to release iOS 10 and macOS Sierra on Sept. 7, mobile technology enthusiasts are eagerly anticipating many exciting new features.
securityintelligence.webp 2016-09-07 11:55:30 Podcast: What\'s So Great About Collaborative Defense? (lien direct) In the latest edition of the Security Intelligence podcast, IBM's Pam Cobb discusses the many benefits of collaborative defense.
securityintelligence.webp 2016-09-07 10:30:28 What\'s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation (lien direct) IBM experts Dustin Hoff and Ashish Malhotra discussed ways for businesses and end users to mitigate security issues stemming from SMS authentication.
securityintelligence.webp 2016-09-06 12:45:27 It\'s the Simple Things: Getting the Basics Right Can Solve Complex Security Issues (lien direct) Instead of concentrating on zero-day threats, security teams should focus on preventing common, simple attacks to solve complex security issues.
securityintelligence.webp 2016-09-06 11:00:30 Bilal Bot: That Time a Malware Developer Asked Me to Correct a Security Blog (lien direct) An anonymous user who claimed to be the author of Bilal Bot reached out to IBM via a Russian domain to set the record straight about the malware.
securityintelligence.webp 2016-09-06 08:40:28 Preparing for the GDPR: Who\'s Protecting Your Data When Silos Break Down? (lien direct) CISOs preparing for the GDPR must walk a fine line, collecting huge amounts of data to enable business while ensuring compliance with privacy regulations.
securityintelligence.webp 2016-09-05 14:50:31 Take Advantage of Security Cheat Codes With Behavioral Intelligence (lien direct) Behavioral intelligence helps analysts understand behavior patterns to sniff out insider threats before they occur - a kind of cheat code for IT security.
Last update at: 2024-07-15 11:08:22
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter