Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2016-09-05 14:50:31 |
Take Advantage of Security Cheat Codes With Behavioral Intelligence (lien direct) |
Behavioral intelligence helps analysts understand behavior patterns to sniff out insider threats before they occur - a kind of cheat code for IT security.
|
|
|
|
|
2016-09-05 13:25:28 |
Why Should Women in Security Shoot for the Stars? (lien direct) |
In response to the dearth of women in security, IBM is leading an industrywide push to encourage and enable women to pursue cybersecurity careers.
|
Guideline
|
|
|
|
2016-09-04 14:25:26 |
Cybercrime-as-a-Service Poses a Growing Challenge (lien direct) |
Cybercrime-as-a-service poses a new security challenge because it allows malicious actors to leverage other cybercriminals' resources to conduct attacks.
|
|
|
|
|
2016-09-02 12:30:40 |
Fighting Fire With WinDBG: Breaking URLZone\'s Anti-VM Armor (lien direct) |
URLZone, a sophisticated banking Trojan that first emerged in 2009, keeps its inner workings under wraps with extensive anti-research features.
|
|
|
|
|
2016-09-02 11:40:29 |
Podcast: Today\'s Fraud Trends, From the Dark Web to Pokemon Go (lien direct) |
In this short podcast, IBM Executive Security Advisor Etay Maor shares his thoughts on the current state of cyber fraud and the latest fraud trends.
|
|
|
|
|
2016-09-02 11:10:26 |
Data Sabotage: The Serious Security Risk of Smart Cities (lien direct) |
Smart city technology is on the rise, bringing more efficient ways to administer city services. But the new threat of data sabotage also looms.
|
|
|
|
|
2016-09-01 13:00:48 |
Undocumented Patched Vulnerability in Nexus 5X Allowed for Memory Dumping via USB (lien direct) |
The IBM X-Force Application Security Research Team discovered a previously undocumented vulnerability in older versions of Nexus 5X's Android images.
|
|
|
|
|
2016-09-01 11:50:25 |
Is IoT Security a Ticking Time Bomb? (lien direct) |
The IoT will continue to grow and evolve at a rapid pace, but many devices, apps and infrastructure are developed with IoT security as an afterthought.
|
|
|
|
|
2016-09-01 10:45:28 |
Anti-ROP: A Moving Target Defense (lien direct) |
IBM Research - Haifa recently developed a solution that acts like a moving target, randomizing files to safeguard against ROP attacks.
|
|
|
|
|
2016-08-31 12:35:25 |
Want Fries With Your EXTRABACON or EPICBANANA? Cisco Addresses Two New Vulnerabilities (lien direct) |
Cisco recently addressed two exploits that sound more like delicious drive-thru menu items than dangerous security risks: EXTRABACON and EPICBANANA.
|
|
|
|
|
2016-08-31 11:15:25 |
Out With the Old, in With the New: Are You Ready to Move to IDaaS? (lien direct) |
A move to IDaaS requires skill, knowledge and a small leap of faith, but the increased control over the cloud environment is well worth the elbow grease.
|
|
|
|
|
2016-08-31 09:35:25 |
How Small and Midsize Businesses Can Stop Cyberattacks (lien direct) |
In addition to the financial repercussions that result from cyberattacks, small and midsize businesses stand to lose the trust of their customers.
|
|
|
|
|
2016-08-30 12:25:24 |
Sabotage: The Latest Threat to the Financial/Banking Industry (lien direct) |
Data sabotage has become a top security concern impacting the financial/banking industry as cybercriminals find ways to profit by altering financial data.
|
|
|
|
|
2016-08-30 11:35:25 |
Dealing With Third-Party Vendor Connections in Your Network (lien direct) |
While most third-party vendor connections are harmless and well-intentioned, they can act as footholds for attackers to gain access to your network.
|
|
|
|
|
2016-08-30 08:15:26 |
Identify Vulnerabilities in Your IT Infrastructure, Policies and Procedures Before the Bad Guys Do (lien direct) |
Penetration testing is one of the most effective ways to monitor the security of your IT environment and identify vulnerabilities.
|
|
|
|
|
2016-08-29 12:45:27 |
The Increasing Dangers of Code Hooking (lien direct) |
Cybercriminals use code hooking to intercept OS function calls to alter or augment their behavior. The technique is becoming more popular and dangerous.
|
|
|
|
|
2016-08-29 11:00:25 |
Five Signs of Identity Governance Trouble (lien direct) |
Security leaders can manage their organization's risk by identifying and remediating identity governance trouble before it leads to a damaging data breach.
|
Guideline
|
|
|
|
2016-08-29 08:05:24 |
Banking From Brexit to Blockchain: Enabling Commerce by Expanding the International Privacy Shield (lien direct) |
Blockchain provides a secure, transparent ledger that serves as an efficient banking solution for companies lacking full access to banking infrastructure.
|
|
|
|
|
2016-08-28 14:35:24 |
Raising the Profile of Women in Security (lien direct) |
Despite the shortage of women in security, the barriers to achieving gender equality are coming down as women gain more influence in the industry.
|
|
|
|
|
2016-08-26 11:35:23 |
Security Conferences Abound: Which Should You Attend? (lien direct) |
Security leaders, professionals and operational business leaders all stand to benefit from the myriad security conferences being held in 2017.
|
Guideline
|
|
|
|
2016-08-26 05:00:25 |
Ramnit Rears Its Ugly Head Again, Targets Major UK Banks (lien direct) |
After an eight-month period of dormancy, the Ramnit Trojan has resurfaced to attack the customers of six major banks in the U.K.
|
|
|
|
|
2016-08-25 13:00:24 |
Do Faster Payments Mean Faster Fraud? (lien direct) |
A system of faster clearing times could help businesses and hardworking families, but the shift could open a window for cybercriminals to commit fraud.
|
|
|
|
|
2016-08-25 11:50:23 |
Using Blockchain to Address Drone Cybersecurity (lien direct) |
The vast availability of drones raises many concerns about drone cybersecurity. However, blockchain technology may be able to help.
|
|
|
|
|
2016-08-25 09:50:24 |
Three Overlooked Benefits of a CASB (lien direct) |
A CASB is helpful for harnessing shadow IT cloud applications, but it can also offer three additional benefits that companies often overlook.
|
|
|
|
|
2016-08-24 12:55:23 |
Get the Security Budget You Need and Spend It Wisely (lien direct) |
Many CISOs find it challenging to convince their boards of directors to increase their security budget to mitigate the cost of a potential data breach.
|
|
|
|
|
2016-08-24 11:45:23 |
Chip-and-PIN Fraud: The New Face of Credit Crime? (lien direct) |
As companies increasingly adopt EMV technology for point-of-sale terminals, attackers are finding new ways to commit chip-and-PIN fraud.
|
|
|
|
|
2016-08-24 10:00:25 |
Understanding the SPF and DKIM Spam Filtering Mechanisms (lien direct) |
Sender Policy Framework and DomainKeys Identified Mail are two techniques that can be used to limit the amount of spam in inboxes.
|
|
|
|
|
2016-08-23 12:50:24 |
Dangle Carrots in Front of Users to Correct Their Terrible Password Hygiene (lien direct) |
Rewarding users for strong password selection can be a good way to eliminate terrible password hygiene throughout an organization.
|
|
|
|
|
2016-08-23 11:00:26 |
GozNym\'s Euro Trip: Launching Redirection Attacks in Germany (lien direct) |
GozNym continued its trip around Europe by launching redirection attacks against 13 German banks. The volume of these attacks has spiked in recent months.
|
|
|
|
|
2016-08-22 15:00:25 |
Innovation Fuels IBM QRadar Leadership (Again) in Gartner\'s 2016 Magic Quadrant for SIEM (lien direct) |
IBM QRadar is a leader again in the 2016 Gartner Magic Quadrant for SIEM, further cementing its reputation as a top security solution.
|
Guideline
|
|
|
|
2016-08-22 10:30:24 |
Is Watson Like a Firefly? (lien direct) |
You've heard the buzz words "Watson" and "cognitive" floating like fireflies on a summer night. Watson is changing the future, one small step at a time.
|
|
|
|
|
2016-08-19 12:00:24 |
Get the Identity Governance Scoop: Interview With an Expert (lien direct) |
To learn more about identity governance and intelligence, we interviewed Andy Taylor, one of IBM's identity and access management specialists.
|
|
|
|
|
2016-08-19 11:45:22 |
Planning Your Response: Top Three Reasons to Integrate Your SIEM With an Incident Response Platform (lien direct) |
An incident response platform facilitates communication across an organization and generates insight on how to contain and resolve security incidents.
|
|
|
|
|
2016-08-18 10:05:22 |
The Top Four Reasons CISOs Are Adopting Cloud-Based Solutions for Identity and Access Management (lien direct) |
As business moves to the cloud, it makes sense for CISOs to manage identity and access management functions with cloud-based solutions.
|
|
|
|
|
2016-08-17 11:40:22 |
New FFIEC Mobile Financial Services Guidelines Services Put a Stake in the Ground (lien direct) |
The Federal Financial Institutions Examination Council put a stake in the ground with recent guidance on risks associated with mobile financial services.
|
|
|
|
|
2016-08-16 14:00:23 |
Brazil Can\'t Catch a Break: After Panda Comes the Sphinx (lien direct) |
IBM X-Force researchers uncovered the first Zeus Sphinx attacks in Brazil, which target online banking and payment services in Brazil's top banks.
|
|
|
|
|
2016-08-16 07:40:21 |
As India Gears Up for Cybersecurity Challenges, Threats Are Multiplying (lien direct) |
India has launched a series of initiatives aimed at overcoming cybersecurity challenges, decreasing costs and battling modern threats.
|
|
|
|
|
2016-08-15 08:40:22 |
Getting Ready for the European Union\'s General Data Protection Regulation? Learn, Think and Prepare (lien direct) |
The European Union's General Data Protection Regulation goes into effect on May 25, 2018, and subjects noncomplying organizations to steep fines.
|
|
|
|
|
2016-08-12 10:30:32 |
A Risk-Driven Approach to Security, From Check Boxes to Risk Management Frameworks (lien direct) |
Department heads have to start thinking about risk management in terms of acceptable risk levels, not compliance requirements to mark off a checklist. |
|
|
|
|
2016-08-11 13:10:21 |
Cloud IAM Scenarios in Retail, Academia and Finance: Three Tips From an IDaaS Expert (lien direct) |
The demand for IDaaS is expanding into every industry. Retailers, universities and financial institutions can benefit from adopting cloud IAM solutions. |
|
|
|
|
2016-08-11 10:30:21 |
Go for Gold by Transforming Compliance Into Data Security (lien direct) |
Organizations should go for gold when it comes to data security rather than simply doing enough to satisfy compliance requirements. |
|
|
|
|
2016-08-10 12:10:26 |
Government Data Woes: 2016 Compromised Records Surpass Total for Last Three Years Combined (lien direct) |
Government entities in the U.S. and abroad have been targeted by malware infections, phishing schemes, SQL injection attacks and more. |
|
|
|
|
2016-08-10 09:40:19 |
Millennials Are Not Burdens but Vital in the Security Workforce (lien direct) |
Millennials are not the problem; they're the future. The ability to attract and retain millennial talent is a vital to long-term success in security. |
|
|
|
|
2016-08-09 12:35:19 |
Using Feedback Loops to Enhance End User Security (lien direct) |
Security teams can use a feedback loop to measure end user security, educate users, illustrate consequences and measure end user behavior. |
|
|
|
|
2016-08-09 08:25:18 |
Insider Threats in India: Is It Time to Focus on Privileged Users? (lien direct) |
Insider threats can be even more devastating to an Indian organization than distributed denial-of-service (DDoS) or malware attacks. |
|
|
|
|
2016-08-08 10:20:19 |
Ransomware and Health Care: There\'s More at Risk Than Just Money (lien direct) |
Many cybercriminals have turned to ransomware as a cheaper, simpler alternative to traditional methods of stealing medical records. |
|
|
|
|
2016-08-05 14:10:19 |
Protecting Your Network Through Understanding DNS Requests (lien direct) |
Sometimes it just takes a little common sense and knowledge of your system log files and the DNS requests contained therein to detect a data breach. |
|
|
|
|
2016-08-05 11:05:19 |
Identity Theft and Social Media: How Are They Related? (lien direct) |
Social media has created many new ways for people to interact. While this can be viewed as exciting, it also leaves users vulnerable to identity theft. |
|
|
|
|
2016-08-04 16:00:20 |
Panda Is One Hungry Bear! A Heavyweight Banking Trojan Rolls Into Brazil (lien direct) |
A new Zeus Trojan variant called Panda Banker that started targeting banks in Europe and North America early this year has spread to Brazil. |
|
|
|
|
2016-08-04 11:35:35 |
The True Cost of Cybercrime in Brazil (lien direct) |
Cybercrime in Brazil continues to rise. In fact, the average cost of a data breach increased significantly in 2016. |
|
|
|