Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2017-12-13 12:26:08 |
Checking It Twice: The Impact of the Time It Takes to Make Decisions About E-Commerce Fraud (lien direct) |
During the busy holiday shopping season, retailers must make decisions about e-commerce fraud rapidly to keep pace with demanding delivery schedules.
|
|
|
|
|
2017-12-13 12:06:05 |
The Benefits of Operational Risk Management (lien direct) |
Operational risk management can help organizations measure the cost of network security solutions versus the cost of a potential data breach.
|
|
|
|
|
2017-12-12 12:46:07 |
Does Your SIEM Need More Cowbell? (lien direct) |
IBM QRadar offers all the bells and whistles - and cowbell - security teams need to enhance their SIEM capabilities without paying an arm and a leg.
|
|
|
|
|
2017-12-11 13:01:05 |
\'Tis the Season for Increased Cybersecurity Vigilance (lien direct) |
Cybersecurity vigilance is crucial during the holiday shopping season, but it's equally important to carry that security awareness into the new year.
|
|
|
|
|
2017-12-11 12:36:03 |
Understanding the COSO 2017 Enterprise Risk Management Framework, Part 1: An Introduction (lien direct) |
The new COSO enterprise risk management framework offers business leaders a road map to more effectively assess, manage, review and report on cyber risks.
|
Guideline
|
|
|
|
2017-12-11 11:46:03 |
Revisiting the Top Security Threats of 2017 (lien direct) |
Many of the security threats we noted at the start of 2017 gripped the public's attention during the past year, foreshadowing major shifts to come in 2018.
|
|
|
|
|
2017-12-08 13:01:05 |
Cybersecurity, Fraud and Operational Risk: The Time for Cognitive Convergence Is Now (lien direct) |
The threat landscape is expanding, and organizations must undergo a cognitive convergence to manage evolving security, fraud and operational risks.
|
|
|
|
|
2017-12-07 13:16:12 |
What Does Secure Digital Transformation Mean to You? (lien direct) |
A secure digital transformation requires open lines of communication and collaboration between line of business executives and security leaders.
|
Guideline
|
|
★★
|
|
2017-12-07 12:46:06 |
When Legacy Tools Fail, Next-Generation Antivirus Solutions Can Defuse Endpoint Security Risks (lien direct) |
Legacy antivirus tools require more resources to operate and are less effective than next-generation solutions at defusing endpoint security risks.
|
|
|
|
|
2017-12-07 12:11:07 |
Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition (lien direct) |
At IRISSCON 2017, 48 contestants across 12 teams battled it out in a free-for-all CTF competition to test their hacking, defending and forensics skills.
|
|
|
|
|
2017-12-06 21:16:04 |
IBM Security Increases Its Leadership Position in the Gartner 2017 SIEM Magic Quadrant (lien direct) |
IBM Security was named a leader in Gartner's 2017 Magic Quadrant for SIEM, an honor that reflects IBM's continued commitment to innovation in the field.
|
Guideline
|
|
|
|
2017-12-06 13:01:03 |
Naughty or Nice? Why the Total Cost of E-Commerce Fraud Is Worse Than You Think (lien direct) |
For retailers who are primarily concerned with minimizing chargebacks, the total cost of e-commerce fraud is worse than they realize.
|
|
|
★★★★
|
|
2017-12-06 11:01:04 |
Teaming Up to Overhaul Authentication (lien direct) |
IBM is partnering with leading authentication providers to make it easier to integrate new authentication technologies with IBM Security Access Manager.
|
Guideline
|
|
|
|
2017-12-05 18:36:02 |
The Evolution of the SIEM (lien direct) |
SIEM technology has evolved drastically over the past decade and will continue to mature as the threat landscape shifts and customers' needs change.
|
|
|
|
|
2017-12-05 15:26:05 |
IBM a Leader in \'The Forrester Wave: Enterprise Mobility Management, Q4 2017\' (lien direct) |
For the third straight time, IBM was recognized as a leader in "The Forrester Wave: Enterprise Mobility Management, Q4 2017" for its MaaS360 offering.
|
Guideline
|
|
|
|
2017-12-05 12:51:03 |
Bringing Shadow IT Into the Security Light (lien direct) |
Shadow IT is created by employees accessing cloud services without prior approval, and it can be devastating to your enterprise's security posture.
|
|
|
|
|
2017-12-05 11:36:04 |
Infusing New Perspectives Into the Cybersecurity Workforce With a New Collar Approach (lien direct) |
A great way to bolster the dwindling cybersecurity workforce is to hire professionals who lack technical degrees but offer fresh perspectives.
|
|
|
|
|
2017-12-04 17:09:23 |
Loss Prevention Trends to Watch During the Holiday Shopping Season (lien direct) |
Physical theft accounted for two-thirds of inventory shrinkage in 2016, suggesting that retailers need to improve their loss prevention strategies.
|
|
|
|
|
2017-12-04 12:51:03 |
Let Silent Security Drive Your Identity and Access Management (lien direct) |
IBM Identity and Access Management (IAM) solutions deliver silent security, which enables analysts to protect your identity by monitoring behavioral data.
|
|
|
|
|
2017-12-04 10:15:59 |
Designing Your GDPR Plan: It\'s Time to Move From \'What\' to \'How\' (lien direct) |
After the Assess phase of your GDPR readiness journey, it's time to move onto the Design phase to determine how you'll achieve and maintain compliance.
|
|
|
|
|
2017-12-02 19:11:01 |
What\'s Behind the Rising Tide of Ransomware? (lien direct) |
The rate of ransomware is rising, largely due to the availability of exploit kits and ransomware-as-a-service (RaaS) packages in underground marketplaces.
|
|
|
|
|
2017-12-01 12:46:02 |
Improving Decision-Making in User Access Review and Cleanup Projects (lien direct) |
Machine learning algorithms can help security teams improve decision-making while conducting user access review and cleanup projects.
|
|
|
|
|
2017-11-30 13:21:08 |
The History and Reinvention of NAC (lien direct) |
Network access control (NAC) and enterprise networks themselves have come a long way in the past decade.
|
|
|
|
|
2017-11-30 12:41:02 |
The Case for Endpoint Detection and Response Tools: Why Traditional Protection Fails (lien direct) |
Following recent malware evolution, modern endpoint detection and response tools should not rely on just one trigger event, but on sophisticated logic.
|
|
|
|
|
2017-11-30 11:56:01 |
Securing Mobile Transactions and Payments in the Age of Connected Devices (lien direct) |
Simple security best practices can go a long way toward securing mobile transactions and payments for both consumers and service providers.
|
|
|
|
|
2017-11-29 13:01:03 |
Moving Target Defense: A Digital Shell Game (lien direct) |
Moving target defense constantly shifts the environment surrounding sensitive data, making it harder for would-be attackers to identify vulnerabilities.
|
|
|
|
|
2017-11-29 11:51:01 |
All Aboard! Applying the Security Immune System Approach to the Railroad Industry (lien direct) |
When it comes to protecting the railroad industry from cyberthreats, the security immune system approach can reduce incident triage from months to minutes.
|
|
|
|
|
2017-11-29 04:01:02 |
Three Steps to Secure Your AWS Environment Using IBM QRadar (lien direct) |
IBM QRadar can help you secure your AWS environment by checking for misconfigurations, monitoring for anomalous activity and curating content rules.
|
|
|
|
|
2017-11-28 16:06:00 |
Ursnif v3 Emerges, Targets Australian Bank Customers With Redirection Attacks (lien direct) |
A new cybergang operating a recent variant of the Ursnif Trojan has planted its flag in Australia, targeting banking customers with redirection attacks.
|
|
|
|
|
2017-11-28 12:51:03 |
Traveling This Holiday Season? Beware of RFID Attacks (lien direct) |
Consumers traveling during the holiday season should be aware of RFID attacks that could enable thieves to control their hotel key cards and digital locks.
|
|
|
|
|
2017-11-28 12:05:59 |
How Israel Became the Land of Connected Car Research and Development (lien direct) |
With its many manufacturer-sponsored test labs, smart car startups and military imperatives, Israel is becoming a major hub for connected car research.
|
|
|
|
|
2017-11-27 13:05:10 |
The \'Cracken\' in Action: A Password Cracking Adventure (lien direct) |
To maximize the horsepower of its password cracking system, the IBM X-Force team built its own hardware to aid in penetration testing efforts.
|
|
|
★★★★
|
|
2017-11-27 10:40:59 |
IoT Security: The Cold, Hard Truth About Digital Device Defense (lien direct) |
Is better digital device defense possible, or is securing the Internet of Things (IoT) an impossible task?
|
|
|
|
|
2017-11-27 10:25:59 |
Omnichannel Success Requires Retail Data Protections (lien direct) |
Omnichannel retailing is making shopping easier for consumers, but also presenting complexities to retailers.
|
|
|
|
|
2017-11-23 13:01:00 |
Innovation, Collaboration and Security Awareness: What We\'re Grateful for This Thanksgiving (lien direct) |
On this holiday, see what our contributors are thankful for in the world of cybersecurity, including improved security awareness and continued innovation.
|
|
|
|
|
2017-11-22 13:00:39 |
Cybersecurity Tips to Help Retailers and Consumers Stay Secure During the Holiday Season (lien direct) |
Consumers and retailers should implement these basic cybersecurity tips year-round to stay secure during the busy holiday shopping season.
|
|
|
|
|
2017-11-22 12:25:57 |
Aspects of Security We Need to Be Thankful For (lien direct) |
With the seemingly perpetual negativity surrounding security, there's still a lot to be thankful for and admire in today's environment.
|
|
|
|
|
2017-11-22 11:26:11 |
Canadian Business Banking Customers Hit With Targeted Phishing, Account Takeover Attacks (lien direct) |
A targeted phishing campaign aimed at Canadian businesses prompts users with high levels of access to divulge login credentials and authentication codes.
|
|
|
|
|
2017-11-21 13:15:57 |
Why Knock Innovation? SIEM Didn\'t Die - It Evolved (lien direct) |
SIEM has evolved from its comparatively humble beginnings to integrate user behavior analysis and log management capabilities that are critical to any SOC.
|
|
|
|
|
2017-11-21 12:40:59 |
Quit Your Day Job: Filling the Cybersecurity Skills Gap With Freelance Security Professionals (lien direct) |
Hiring freelancers can help companies close the cybersecurity skills gap, reduce overhead and infuse a fresh perspective into the organizational culture.
|
|
|
|
|
2017-11-21 12:05:56 |
\'Tis the Season for Retail Disruption (lien direct) |
Companies looking to minimize retail disruption during this holiday season should keep close tabs on emerging trends such as ransomware, the IoT and more.
|
|
|
★★★★
|
|
2017-11-20 13:11:04 |
Don\'t Let Network Complexity Tangle Up Your Security Strategy (lien direct) |
Overwhelmed network managers can significantly reduce network complexity by using automation in tandem with a well-defined policy.
|
|
|
|
|
2017-11-20 12:26:00 |
Wireless Security Lessons From the WPA2 Vulnerability (lien direct) |
One of the biggest WPA2 vulnerability wireless security lessons: Few people are aware, fewer know how to patch it and fewer still will do so.
|
|
|
|
|
2017-11-20 11:45:58 |
Take a Load Off: Delegate Cyber Risk Management Using the Three Lines of Defense Model (lien direct) |
The Three Lines of Defense model enables board directors to be involved in the cyber risk management process without micromanaging the security team.
|
|
|
|
|
2017-11-17 13:05:56 |
Why I Became an E-Resident of Estonia (lien direct) |
Estonia is leading the way in digital innovation, providing smart ID cards to its citizens to vote and interact with other public services.
|
Guideline
|
|
|
|
2017-11-17 12:30:57 |
Fileless Malware Prompts Evolution of Endpoint Defenses (lien direct) |
A new generation of fileless malware has emerged, taking advantage of dynamic environments and prompting the need for more advanced defenses.
|
|
|
★★★★
|
|
2017-11-16 13:10:58 |
Steganography: A Safe Haven for Malware (lien direct) |
Steganography continues to be an incredibly versatile and effective method for obscuring or hiding information in plain sight.
|
|
|
|
|
2017-11-16 13:05:55 |
What to Know About the 2017 Gartner IAM Summit (lien direct) |
Looking forward to this year's Gartner IAM Summit in Las Vegas? Here's what you need to know to make the most of this conference.
|
|
|
|
|
2017-11-16 11:00:56 |
New Quad9 DNS Service Makes the Internet Safer and More Private (lien direct) |
Quad9 goes far beyond standard DNS name resolution to improve privacy, security scalability and ease of use.
|
|
|
|
|
2017-11-15 14:45:58 |
Software-Defined Security With SD-WAN (lien direct) |
It's no wonder organizations are embracing SD-WAN, which abstracts various connectivity options to provide a virtualized enterprise WAN.
|
|
|
|