What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2016-08-03 10:55:16 What\'s in Your Event Cybersecurity Strategy? (lien direct) Event cybersecurity strategies and tools can help improve the digital security and, in turn, the physical security of guests at your event.
securityintelligence.webp 2016-08-02 14:05:21 X-Force Red Gets Serious About Penetration Testing (lien direct) X-Force Red offers vulnerability analytics backed by the experience of hundreds of thousands of the world's best technologists.
securityintelligence.webp 2016-08-02 11:45:22 Five Critical Steps to Effectively Selecting an Application Security Testing Provider (lien direct) Companies and organizations must consider a wide range of critical factors when selecting an application security testing provider.
securityintelligence.webp 2016-08-02 08:45:22 Cloud Adoption and Challenges in Asia-Pacific (lien direct) Global cloud adoption has increased over the years and continues to grow at a rapid pace, especially in the Asia-Pacific region.
securityintelligence.webp 2016-07-31 08:50:17 Hungry Hippos Meet Interactive Cyber Management at Black Hat USA 2016 (lien direct) A unique, interactive game at this year's Black Hat USA event will test players' ability to stay calm in a crisis, a key skill to have during a cyberattack
securityintelligence.webp 2016-07-29 10:10:25 Read From PDF, Write to Edge\'s Memory (CVE-2016-0117) (lien direct) CVE-2016-0117 can be exploited to perform an arbitrary write to Edge's content process memory, a critical element for remote code execution.
securityintelligence.webp 2016-07-28 11:05:20 Windows 10 Updates: What Does It Mean for Customers? (lien direct) Microsoft shifted its approach to updating its Windows OS platform with Windows 10. Here's what you have to know about the options for enterprises.
securityintelligence.webp 2016-07-27 10:15:16 Exploring Operating Systems for the Internet of Things (lien direct) As the Internet of Things becomes more prevalent, the demand for the technologies needed to manage and secure devices becomes greater.
securityintelligence.webp 2016-07-26 17:10:21 International Businesses Will Encounter Multijurisdictional Compliance Issues (lien direct) Companies engaging in international business, especially those with offices abroad, will undoubtedly encounter multijurisdictional compliance issues.
securityintelligence.webp 2016-07-26 11:15:16 The Information Security Leader, Part 4: Three Persistent Challenges for CISOs (lien direct) Today's business climate presents challenges for CISOs regarding the definition of risk, uncertainties of measuring risk and effective communication.
securityintelligence.webp 2016-07-26 07:10:21 The Cost of a Data Breach in India: What You Need to Know (lien direct) Indian companies should implement data security strategies such as encryption and threat sharing to reduce the impact and cost of a data breach.
securityintelligence.webp 2016-07-25 12:45:22 Social Engineering and the Stranded Olympic Traveler (lien direct) Visitors to the 2016 Summer Olympic Games in Rio de Janeiro should be on high alert for the stranded traveler social engineering scam.
securityintelligence.webp 2016-07-25 10:15:20 May the Best IAM Program Win: Four Steps to Shoot for the Gold (lien direct) A mature IAM program optimized to a business's objectives and the unique circumstances surrounding it can minimize the risk of data breaches.
securityintelligence.webp 2016-07-22 12:00:30 Team With Experts for Security Analytics in the Cloud (lien direct) IBM QRadar on Cloud allows you to team with experts who can implement a security analytics platform and help control your evolving security environment.
securityintelligence.webp 2016-07-22 08:15:14 The Onrushing Tsunami Known as the GDPR (lien direct) The GDPR is going to dramatically change how organizations conduct business throughout Europe. Here's what you need to know right now.
securityintelligence.webp 2016-07-21 12:00:15 Going for Gold: Cybercrime and the Brazilian Threat Landscape (lien direct) The upcoming Summer Olympics in Rio de Janeiro provide an opportunity for cybercriminals to exploit the Brazilian threat landscape.
securityintelligence.webp 2016-07-20 12:51:14 The Threat From Weaponized IoT Devices: It\'s Bigger Than You Think! (lien direct) Cybercriminals are leveraging IoT devices to carry out extremely sophisticated attacks. How do you protect yourself and your organization?
securityintelligence.webp 2016-07-20 10:01:16 Blockchain Primer: It\'s Way More Than Just Bitcoin (lien direct) The future of blockchain goes far beyond the banking industry. In fact, this new element of security could have far-reaching consequences across sectors.
securityintelligence.webp 2016-07-19 10:51:15 The Information Security Leader, Part 3: Four Fundamental Questions for Risk Analysis (lien direct) When it comes to a risk analysis, CISOs need to translate the question "How secure are we?" into one of the four fundamental questions about risk.
securityintelligence.webp 2016-07-19 07:36:24 Three Enigmas Facing Indian Banks: Reputation, Regulation and Resources (lien direct) Indian banks struggle with the challenges posed by online banking and mobile banking. With new breakthroughs come new challenges.
securityintelligence.webp 2016-07-18 10:36:13 Children\'s Health Care, Patient Records and Black Market Identity Theft (lien direct) Children's hospitals often fall victim to black market identity theft because their primary goal is treating patients — data security is secondary.
securityintelligence.webp 2016-07-15 11:01:14 Share Services and Security Can Follow (lien direct) A panel titled "Share Your Services, Not Your Threats" discussed how government departments can share services without sacrificing security.
securityintelligence.webp 2016-07-15 08:26:14 Can \'Angry Birds\' Help Make Sense of Security? (lien direct) The "Angry Birds" movie can teach security professionals a lot about what matters when it comes to identifying and responding to threats.
securityintelligence.webp 2016-07-14 15:11:14 Look Who\'s Calling: The Rise of the Robocalls (lien direct) The FTC is fighting back against annoying and criminal robocalls, which have been made possible thanks to the growth of voice-over-IP (VoIP) technology.
securityintelligence.webp 2016-07-14 10:21:35 Is Full Packet Capture Worth the Investment? (lien direct) Packet capture certainly isn't new, and more companies are seeing the value in it. But is full packet capture worth the investment? ★★★★★
securityintelligence.webp 2016-07-13 10:26:12 CryptoLocker Ransomware Is on the Rise — Here\'s What to Do if You\'re Attacked (lien direct) The popularity of threats such as the CryptoLocker ransomware highlights some security best practices that can help enterprises avoid attacks.
securityintelligence.webp 2016-07-12 11:51:15 The Information Security Leader, Part 2: Two Distinct Roles of a CISO (lien direct) Information security leaders today must be able to fill the two distinct roles of a CISO: the subject-matter expert and the trusted business adviser. Guideline
securityintelligence.webp 2016-07-12 09:31:15 The Insider Threat: Are You at Risk? (lien direct) Some security red flags, such as the presence of shadow IT and weak authentication practices, could indicate a high risk for an insider threat.
securityintelligence.webp 2016-07-11 15:46:13 Risk-Based Security Lessons From Airport Lines (lien direct) Take some time to reflect on how airport security and initiatives from the TSA can influence risk-based security practices in the enterprise.
securityintelligence.webp 2016-07-11 11:16:13 IDaaS: Life Before and After Cloud IAM (lien direct) A security expert spoke to Security Intelligence regarding how cloud IAM quickly solves common identity and access management problems.
securityintelligence.webp 2016-07-08 19:36:15 GootKit: Bobbing and Weaving to Avoid Prying Eyes (lien direct) IBM X-Force researchers recently studied the GootKit banking Trojan — and the many ways it effectively evades detection and maintains persistence. ★★★
securityintelligence.webp 2016-07-08 11:01:12 3-D Printing Vulnerabilities: Build Your Own Breach? (lien direct) A surge in 3-D printing vulnerabilities could leave the enterprise open to intellectual property theft or general process disruption.
securityintelligence.webp 2016-07-07 13:01:18 Remote Code Execution in Xiaomi MIUI Analytics (lien direct) The IBM X-Force AppSec Research Team has discovered a remote code execution (RCE) vulnerability in MIUI, the flavor of Android developed by Xiaomi.
securityintelligence.webp 2016-07-07 09:36:10 After the Brexit: Three New Challenges Facing European Security Leaders (lien direct) Now that the U.K. has voted in favor of the Brexit, security leaders across Europe will have to handle a few new challenges stemming from the move. Guideline
securityintelligence.webp 2016-07-06 17:31:11 Will Blockchain Technology Replace Traditional Business Models? (lien direct) Blockchain technology has become a hot trending topic within the computer world in the last couple years. There's more to it than just bitcoins.
securityintelligence.webp 2016-07-06 11:01:13 Not All Heroes Wear Capes: How IAM Can Save You From Your Next Data Breach (lien direct) Identity and access management solutions that incorporate risk-based controls can help organizations avoid a potentially harmful data breach.
securityintelligence.webp 2016-07-05 12:56:08 The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges (lien direct) An information security leader today needs to fill multiple roles and be capable of addressing new challenges related to managing risk. Guideline
securityintelligence.webp 2016-07-05 12:01:12 Account Takeovers: They Can Happen to Anyone (lien direct) Social media account takeovers have recently impacted some high-profile individuals and groups, but a few simple measures can greatly reduce this risk.
securityintelligence.webp 2016-07-05 10:06:10 BadTunnel: Bad News? (lien direct) The recently discovered BadTunnel could mean bad news for Microsoft Windows users — that is, unless they move to patch their systems immediately.
securityintelligence.webp 2016-07-01 11:56:07 Five Ways to Help Your Alma Mater Take Data Security to the Next Level (lien direct) Is your alma mater protecting your personal information? Learn how you can help academia take its data security to the next level.
securityintelligence.webp 2016-07-01 06:36:10 Are You Prepared to Handle the Cost of a Data Breach? (lien direct) The cost of a data breach for organizations in the Asia-Pacific region is rising. Here's what enterprises can do to limit these negative consequences.
securityintelligence.webp 2016-06-30 14:56:12 Integrated Security Solutions for Hybrid Cloud Deployments (lien direct) Special security solutions are needed to protect hybrid cloud environments through managed access, data protection and network visibility.
securityintelligence.webp 2016-06-30 11:06:09 Network Mapping: Better Than Asset Inventory, but Not by Much (lien direct) Adding elements of security intelligence to your network mapping can make a big difference in your organization's security practices.
securityintelligence.webp 2016-06-29 12:01:12 IBM MaaS360 Answers the Call for Secure Chat in the Enterprise (lien direct) Enterprises searching for a secure chat can benefit from IBM MaaS360's instant messaging service, designed to enable productivity and data protection.
securityintelligence.webp 2016-06-28 14:16:24 Sniffles, Sore Throat and Itchy Eyes: How Security Analytics Benefits From Health Care Investments (lien direct) Much like health care professionals provide a diagnosis based on symptoms, security analytics allows experts to focus on the most severe threats.
securityintelligence.webp 2016-06-28 11:51:08 Planes, Trains and Automobiles (and More): No Shortage of Attack Targets in Transportation (lien direct) The transportation industry is a large target for cybercriminals, and the only way to avoid damaging attacks is to be proactive about security.
securityintelligence.webp 2016-06-28 10:31:09 Security Glue: How Threat Intelligence Binds Security Providers and Partners (lien direct) Threat intelligence is the glue that holds security together. It helps create a picture of the most serious threats facing any organization.
securityintelligence.webp 2016-06-27 13:36:08 Midyear Review: The Continuing Challenge of Financial Services Threats (lien direct) Experts made several predictions surrounding financial services threats at the beginning of the year. Halfway through 2016, where do we stand?
securityintelligence.webp 2016-06-27 11:16:11 What Is IDaaS? A CISO Clears Up Confusion Around the Definition of Cloud IAM (lien direct) In an interview, one chief information security officer provides a clear definition of IDaaS, or cloud-based identity and access management.
securityintelligence.webp 2016-06-27 08:26:07 IoT Security: A Government Perspective (lien direct) The Internet of Things (IoT) is changing everything — even how the government operates. But these bodies need to put security and citizen safety first.
Last update at: 2024-07-15 15:08:36
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter