Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2017-03-27 13:00:53 |
Hey Phishing, You Old Foe - Catch This Cognitive Drift? (lien direct) |
Powered by machine learning, IBM Trusteer can help IT professionals nip phishing attacks in the bud with unprecedented speed and accuracy.
|
|
|
★★★★
|
|
2017-03-27 12:01:22 |
CAPEC: Making Heads or Tails of Attack Patterns (lien direct) |
The CAPEC standard for attack categorization enables analysts to more efficiently classify, prioritize and communicate about common threats and events.
|
|
|
|
|
2017-03-27 10:20:52 |
Three Lessons From Test-Driven Development (lien direct) |
Test-driven development was created to inspire security analysts and developers to reconsider the way they plan, design and test software.
|
|
|
|
|
2017-03-24 12:45:53 |
The Third-Party Security Challenge (lien direct) |
Organizations need to assess third-party security to determine whether their partners and contractors are putting critical data at risk.
|
|
|
|
|
2017-03-24 12:00:54 |
Why Your Enterprise Security Strategy Needs to Evolve (lien direct) |
A good security strategy must constantly evolve and adapt to current threats, new protective tools and burgeoning vulnerabilities.
|
|
|
|
|
2017-03-24 10:55:48 |
Why Blockchain-as-a-Service Should Be on Your Radar (lien direct) |
Blockchain-as-a-service could be the next big thing to hit enterprises. Learn about the best options and processes for getting started with this tech.
|
|
|
|
|
2017-03-23 12:50:48 |
The Retail Industry and the Challenges of Enterprise Mobility Management (lien direct) |
MaaS360 provides IT managers in the retail industry with all the enterprise mobility management tools they need to control remote access to corporate data.
|
|
|
★★★
|
|
2017-03-23 11:25:47 |
Virtual Reality, Augmented Reality and Futuristic Threat Modeling (lien direct) |
Augmented and virtual reality can be invaluable tools for threat modeling in all sectors, but the emerging technologies also introduce new vulnerabilities.
|
|
|
|
|
2017-03-22 12:55:46 |
Breaking Down Barriers to Information Security Progress (lien direct) |
Information security programs need to progress to meet the challenges of today and tomorrow, but it's not easy for leaders to overcome common barriers.
|
Guideline
|
|
|
|
2017-03-22 12:00:50 |
Smart Forensics for the Internet of Things (IoT) (lien direct) |
The expanding Internet of Things brings new attack vectors, and cybersecurity experts will need new methods of incident response and forensics to keep up.
|
|
|
|
|
2017-03-22 11:10:48 |
Securing Your Cloud-Based Resources: Start With These Four Areas (lien direct) |
With cloud-based resources becoming an integral part of the enterprise, it's time for security leaders to recognize the best ways to protect these assets.
|
Guideline
|
|
|
|
2017-03-21 18:00:51 |
Understanding Cyber Threat Hunting (lien direct) |
When implementing threat hunting programs for the first time, IT teams should start with basic concepts, then add more capabilities gradually.
|
|
|
|
|
2017-03-21 15:30:49 |
Security Orchestration for an Uncertain World (lien direct) |
Security orchestration is the union of people, process and technology - computer automation where it works, and human coordination where it doesn't.
|
|
|
|
|
2017-03-21 11:30:49 |
Five Ways to Improve the CISO-Board Relationship (lien direct) |
As cyberthreats grow in numbers and complexity, the future of cybersecurity increasingly depends on an open, trusting CISO-board relationship.
|
|
|
|
|
2017-03-20 12:35:49 |
Intelligent Code Analytics: Increasing Application Security Testing Coverage With Cognitive Computing (lien direct) |
With intelligent code analytics, developers can use machine learning to mark up APIs and bring application security testing to the next level.
|
|
|
★★★★★
|
|
2017-03-20 09:00:48 |
Are You Getting the Most From Your Network Security? Five Questions to Ask (lien direct) |
Are you getting the most from your network security? Here are five questions to help you determine whether you need a next-generation security solution.
|
|
|
|
|
2017-03-20 04:05:50 |
Taking a Cognitive Approach to Unified Endpoint Management (lien direct) |
Unified endpoint management solutions can reduce the time and complexity it takes to perform functions traditionally reserved for MDM and EMM tools.
|
|
|
|
|
2017-03-19 14:45:47 |
Man Versus Machine: IBM Brings Science Fiction to Life With Cognitive Security (lien direct) |
With its innovative cloud, IoT and cognitive security offerings, IBM is bringing science fiction to life. Learn more about AI and Watson at InterConnect.
|
|
|
|
|
2017-03-17 13:10:48 |
Your Cybercriminal Has an Image Problem (lien direct) |
The classic image of the Hollywood hacker is misleading. The typical cybercriminal is more likely to be a state-sponsored actor or malicious insider.
|
Guideline
|
|
|
|
2017-03-17 12:00:49 |
Churn Under the Surface of Global Cybercrime (lien direct) |
Global cybercrime actors test their malware in small settings before launching internationally, leaving trails of clues to tip off astute security teams.
|
|
|
|
|
2017-03-17 11:15:46 |
Identity and Access Governance: Lessons From the Front Line (lien direct) |
Identity and access governance is not a technology project - it's a business transformation program. Organizationwide buy in is critical.
|
|
|
|
|
2017-03-16 12:10:48 |
Health Care Providers Need to Comply With HIPAA Regulations and Address These Five Critical Security Issues (lien direct) |
Health care organizations must address these five major cybersecurity concerns to comply with HIPAA regulations and ensure proper handling of patient data.
|
|
|
|
|
2017-03-16 11:45:06 |
QRadar UBA App Adds Machine Learning and Peer Group Analyses to Detect Anomalies in Users\' Activities (lien direct) |
User behavior analytics (UBA) solutions enable SOC analysts to reduce the rate of false positives and more accurately detect insider threats.
|
|
|
|
|
2017-03-16 11:20:51 |
Five Steps to Protect Your Critical Data From Insider Threats (lien direct) |
This five-step approach to securing critical data is the most effective way for organizations to protect their crown jewels from insider threats.
|
|
|
|
|
2017-03-15 15:10:47 |
Representation of Women in Cybersecurity Remains Stagnant, Despite Recent Efforts to Balance the Scales (lien direct) |
According to a new study, the gap between men and women in cybersecurity barely closed since 2015 despite widespread efforts to raise awareness.
|
|
|
|
|
2017-03-15 12:20:48 |
Artificial Intelligence in Security: How Smart Is Smart? (lien direct) |
To fully embrace the power of the cognitive era, security professionals must understand the capabilities and limitations of artificial intelligence.
|
|
|
|
|
2017-03-15 11:30:47 |
CISOs Are Constantly Confronted With Conflicts of Interest (lien direct) |
Companies and individuals may throw ethics out the window when there's an extra buck to be made. CISOs must learn to nip conflicts of interest in the bud.
|
|
|
|
|
2017-03-14 12:10:46 |
QRadar Waves From the Leader Position in the Forrester 2017 Security Analytics Wave (lien direct) |
IBM Security was recognized as a leader in the first ever Forrester Security Analytics Wave, earning the highest scores in solution strength and vision.
|
Guideline
|
|
|
|
2017-03-14 11:30:49 |
Enterprise Intelligence Brief: Three Experts Discuss Blockchain in Cybersecurity (lien direct) |
Blockchain has the potential to revolutionize the way businesses conduct financial transactions in the next few years, according to security experts.
|
|
|
|
|
2017-03-14 11:05:44 |
And Don\'t Be Falling in Love as Security Services Experts Are Walking Away (lien direct) |
Security professionals and enthusiasts will have many opportunities to connect with security services experts at IBM InterConnect 2017.
|
|
|
|
|
2017-03-13 12:55:44 |
The Enterprise Mobility Conundrum: How to Control the Data? (lien direct) |
Businesses can benefit from BYOD policies, but IT leaders must implement the right enterprise mobility solutions to protect their sensitive data.
|
Guideline
|
|
|
|
2017-03-13 11:45:49 |
Inside the Mind of a Hacker: Attacking Web Pages With Cross-Site Scripting (lien direct) |
Web application developers must learn to think like cybercriminals to combat the growing threat of cross-site scripting (XSS) attacks.
|
|
|
|
|
2017-03-13 09:35:53 |
Enticing Clicks With Spam (lien direct) |
According to the upcoming IBM X-Force Threat Intelligence Index, the creation of new TLDs is generating new ways for fraudsters to distribute spam.
|
|
|
|
|
2017-03-10 13:00:48 |
Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations (lien direct) |
Moving SIEM to the cloud enables QRadar customers to increase time to value, address the IT skills shortage and maintain control of their infrastructures.
|
|
|
|
|
2017-03-10 12:00:46 |
Detect, Analyze, Respond: Attend These Key Talks at InfoSec World 2017 (lien direct) |
The InfoSec World 2017 main conference will feature more than 70 talks and collaborative sessions presented by familiar speakers and new voices.
|
|
|
|
|
2017-03-10 11:20:46 |
Lesson Learned From Stuxnet (lien direct) |
Today's IT professionals can extract many lessons from the infamous Stuxnet worm, which was discovered in 2010, to help them protect their SCADA systems.
|
|
|
|
|
2017-03-09 13:45:43 |
Nine Security Practices That May Not Be Effective (lien direct) |
Many common security practices and widely used tools such as firewalls and IDS fail to adequately address the challenges IT professionals face today.
|
|
|
|
|
2017-03-09 13:00:47 |
Showcasing Threat Intelligence at IBM InterConnect (lien direct) |
At InterConnect 2017, experts will demonstrate how IBM is applying Watson for Cyber Security to take threat intelligence to the next level.
|
|
|
|
|
2017-03-09 12:10:45 |
Five Steps to Propel Your Privileged Identity Management Strategy to the Next Level (lien direct) |
Privileged accounts are among the juiciest targets for fraudsters. Follow these five simple steps to become a privileged identity management pro.
|
|
|
|
|
2017-03-08 13:46:00 |
Information Overload - Now What? (lien direct) |
Too many security solutions can generate information overload, but a unified managed security services solution can help IT teams reduce the noise.
|
|
|
|
|
2017-03-08 12:55:41 |
Connecting to the Future With Cognitive Security (lien direct) |
IT teams are beginning to adopt cognitive security solutions to enable their analysts to make connections and drive innovation in the cybersecurity space.
|
|
|
|
|
2017-03-08 11:20:45 |
Hybrid Cloud Adoption: The Logical Next Step Toward Innovation and Modernization (lien direct) |
Companies all over the world are beginning to recognize the potential of hybrid cloud to deliver opportunities for innovation and revenue growth.
|
|
|
|
|
2017-03-07 13:30:58 |
From Linear to Orbital: Rethinking Defense in Depth (lien direct) |
Defense in depth uses a layered approach to protecting networks and systems from breaches. It relies on multiple lines of defense to provide redundancy.
|
|
|
|
|
2017-03-07 12:50:43 |
The Role of the Security Intelligence Analyst and the Three Main Elements of Cybersecurity (lien direct) |
Security intelligence analysts must know the three elements of cybersecurity - threat intelligence, event intelligence and enrichment - to thwart threats.
|
|
|
|
|
2017-03-07 11:55:46 |
Reimagining the Future of Identity Management With Blockchain (lien direct) |
It's time for organizations to adopt blockchain to centralize identity management and establish trust between parties involved in business transactions.
|
|
|
|
|
2017-03-06 15:05:41 |
Building a Cybersecurity Culture Around Layer 8 (lien direct) |
IT leaders must develop a strong cybersecurity culture to promote awareness and accountability, and to empower employees to learn and develop.
|
Guideline
|
|
|
|
2017-03-06 13:00:46 |
Closing Cloud Security Gaps at Every Step of the Migration Process (lien direct) |
When moving data and services to the cloud, IT leaders must implement cloud security measures at every step of the complex migration process.
|
Guideline
|
|
|
|
2017-03-06 11:50:42 |
Cheap Shock: Why Shellshock Is Still a Thing (lien direct) |
Although security researchers discovered Shellshock more than two years ago, it remains popular among fraudsters with basic skill sets and light wallets.
|
|
|
|
|
2017-03-03 14:20:45 |
Avoid Lengthy Pit Stops Along the Road to the Data Protection Finish Line (lien direct) |
Many companies lack a sense of urgency in the race toward total data protection and are unprepared to deal with attacks, compliance requirements and more.
|
|
|
|
|
2017-03-03 12:45:49 |
IBM Retains Leadership Position in 2017 Gartner Magic Quadrant for Application Security Testing (lien direct) |
In the most recent update to the Gartner Magic Quadrant for Application Security Testing report, IBM maintained its position in the "Leaders" Quadrant.
|
Guideline
|
|
|