Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2017-08-25 11:05:26 |
It\'s Wise to Specialize: Choosing the Right Path for Your Cybersecurity Career (lien direct) |
Before pursuing a cybersecurity career, aspiring security professionals should first determine which areas of expertise they would like to specialize in.
|
|
|
|
|
2017-08-24 12:15:26 |
Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks (lien direct) |
By integrating phishing intelligence with an SIEM solution, security analysts can proactively monitor APTs and manage risks related to phishing attacks.
|
|
|
|
|
2017-08-24 11:25:24 |
Board Directors Need to Get Involved With Cyber Risk Governance (lien direct) |
Board directors must become more engaged in cyber risk governance or risk incurring regulatory fines and being sued by shareholders.
|
|
|
|
|
2017-08-24 10:40:25 |
Getting Ahead of SD-WAN Security With the Zero Trust Model (lien direct) |
According to recent studies, security is the top concern among organizations implementing software-defined wide area network (SD-WAN) technology.
|
|
|
|
|
2017-08-23 12:30:27 |
The Five Most Critical Tasks in the CISO Job Description (lien direct) |
Critical elements of the CISO job description are often overlooked, exposing enterprise data and individual employees to cyberthreats.
|
|
|
|
|
2017-08-23 11:55:24 |
Blindfolded on the Battlefield: The Importance of Threat Hunting in the Modern Age (lien direct) |
To keep up with today's advanced cybercrime landscape, security professionals must take a proactive approach to threat hunting and incident response.
|
|
|
|
|
2017-08-23 11:15:26 |
iOS 11 in the Enterprise: Get Your iPads Ready (lien direct) |
The upcoming release of Apple iOS 11 will bring significant changes to the enterprise in the form of enhanced customization, discoverability and more.
|
|
|
|
|
2017-08-22 12:30:26 |
Fighting Financial Fraud in an Increasingly Digital World (lien direct) |
Financial companies that provide mobile services need advanced malware detection tools and threat intelligence to protect customers from financial fraud.
|
|
|
|
|
2017-08-22 12:00:29 |
Shrink Your Enterprise Cloud Computing Security Concerns With a Cloud Vendor Risk Management Program (lien direct) |
Security professionals need a layered, end-to-end life cycle approach to managing the security risks associated with enterprise cloud computing.
|
|
|
|
|
2017-08-22 10:40:25 |
Leading by Example: Security and Privacy in the Education Sector (lien direct) |
Today's students must grapple with security and privacy issues, such as identity theft and financial fraud, that could affect them well past graduation.
|
|
|
|
|
2017-08-21 12:35:30 |
Three Practical Tips That Empower Developers and Prevent Open Source Security Risks From Entering Your Code (lien direct) |
There are many benefits to developing software using open source code, but these components can also introduce vulnerabilities into your code.
|
|
|
|
|
2017-08-21 11:50:26 |
Security Monitoring and Analytics: Moving Beyond the SIEM (lien direct) |
A platform approach to security monitoring empowers analysts to take their SIEM to the next level with advanced threat detection and response capabilities.
|
|
|
|
|
2017-08-21 10:00:30 |
All in a Spammer\'s Workweek: Where Do the Busiest Spammers Work Around the Clock? (lien direct) |
According to recent IBM X-Force data, spammers and spam botnets typically work the same hours we do to maximize their returns.
|
|
|
|
|
2017-08-18 12:00:43 |
Government Agencies Must Work With the Private Sector to Bolster Infrastructure Security (lien direct) |
To improve infrastructure security per the president's executive order, government agencies must build trust with the private security industry.
|
|
|
|
|
2017-08-18 09:50:24 |
Across the Great Divide: Measuring Security Awareness Among US and UK Users (lien direct) |
A survey revealed that while security awareness differs among users in the U.S. and U.K. in a variety of areas, both populations have a long way to go.
|
|
|
|
|
2017-08-17 15:50:25 |
Incident Response and Threat Intelligence: A Potent One-Two Punch to Fight Cybercrime (lien direct) |
IBM X-Force IRIS combines incident response with threat intelligence to help organizations analyze cybercriminals' behavior and predict future trends.
|
|
|
|
|
2017-08-17 12:10:27 |
Protecting Against Spam and Phishing Attacks With a Layered Approach to Email Security (lien direct) |
To protect their users from spam and phishing attacks, security professionals should adopt a basic, layered approach to email security.
|
|
|
|
|
2017-08-17 11:30:26 |
It\'s Up to Employers to Close the Cybersecurity Skills Gap (lien direct) |
When recruiting talent to close the cybersecurity skills gap, employers must demonstrate their commitment to security research, education and knowledge.
|
|
|
|
|
2017-08-16 12:35:24 |
Not Enough Hours in the Day? Respond Faster With Automated, Intelligent Security Analytics (lien direct) |
An automated security analytics platform can help understaffed security teams sift through threat data more efficiently and focus on more critical tasks.
|
|
|
|
|
2017-08-16 11:50:25 |
IDaaS Vendors: IBM Cloud Identity Service Named Market Leader in Six Recent Analyst Reports (lien direct) |
IBM Cloud Identity Service was named a leader in six recent industry reports, solidifying IBM's reputation as one of the industry's top IDaaS vendors.
|
Guideline
|
|
|
|
2017-08-16 10:45:25 |
Stay Up to Date on Threat Intelligence With New X-Force Exchange Capabilities (lien direct) |
The IBM X-Force Exchange features new capabilities and notifications to help security analysts collaborate and share threat intelligence more efficiently.
|
|
|
|
|
2017-08-15 12:00:29 |
Charting Your Identity Governance and Administration Adoption Road Map (lien direct) |
Many companies fail to maximize their identity governance and administration tools because they focus on short-term solutions to long-term problems.
|
|
|
|
|
2017-08-15 11:40:23 |
The Power of Pervasive Encryption (lien direct) |
The new z14 mainframe from IBM includes a revamped coprocessor that enables pervasive encryption of both at-rest and in-transit data.
|
|
|
|
|
2017-08-15 10:20:26 |
Best Practices for Developing and Securing a Microservices Architecture (lien direct) |
When installing a microservices architecture, SecDevOps teams must understand the threat vectors and how they affect the company's compliance stature.
|
|
|
|
|
2017-08-14 12:25:22 |
Testing Top Leadership\'s Muscle Memory With Data Breach Simulations (lien direct) |
Just like security analysts, top executives need data breach training to develop the skills required to carry out an effective incident response strategy.
|
|
|
|
|
2017-08-14 12:00:49 |
Security Monitoring and Analytics: Faster Time to Action (lien direct) |
Security monitoring and analytics platforms deliver business value by reducing the time it takes to identify, investigate and remediate threats.
|
|
|
|
|
2017-08-14 11:05:27 |
Elementary, My Dear Watson: Identifying and Understanding Malware With Cognitive Security (lien direct) |
Cognitive security solutions such as IBM Watson for Cyber Security help analysts process overwhelming amounts of threat data during incident investigations
|
|
|
|
|
2017-08-11 12:05:22 |
Advanced Approaches to ATM Network Protection (lien direct) |
Effective ATM network protection requires a combination of basic and advanced approaches and a strong SIEM solution to monitor anomalous activity.
|
|
|
|
|
2017-08-11 11:30:24 |
Cloud Security and the New Cold War: Corporate Strategies for Winning Digital Battles (lien direct) |
Companies and governments around the world must test their cloud security capabilities to keep sensitive data safe from hacktivists and cyber enemies.
|
|
|
|
|
2017-08-10 11:50:23 |
Eight Myths Not to Believe About Penetration Testing (lien direct) |
Penetration testing can help organizations across all industries identify vulnerabilities before cybercriminals have a chance to exploit them.
|
|
|
|
|
2017-08-10 10:45:22 |
Seeing Data Security Breaches With Your Own Eyes (lien direct) |
The new Data Insight feature for IBM Security Guardium enables analysts to more effectively monitor database access during security breaches.
|
|
|
|
|
2017-08-09 12:20:26 |
The Untapped Potential of Two-Factor Authentication (lien direct) |
Two-factor authentication methods are more secure than passwords alone but require widespread adoption to be universally effective.
|
|
|
|
|
2017-08-09 11:35:21 |
Viewing Cybersecurity From the Consumer\'s Perspective (lien direct) |
In today's complex ecosystem of connected devices, cybersecurity is a key consideration for consumers when shopping for products and services.
|
|
|
|
|
2017-08-09 11:15:21 |
Assessing Risks and Remediating Threats With a Layered Approach to Vulnerability Management (lien direct) |
For many companies, vulnerability management still amounts to an ongoing game of whack-a-mole to identify and remediate threats.
|
|
|
|
|
2017-08-08 12:10:25 |
Where Are They Today? Cybercrime Trojans That No One Misses: Shifu Malware (lien direct) |
Before it started fading out in June 2016, Shifu malware appeared to be targeting banks in Japan and the U.K. and evolving at a steady pace.
|
|
|
|
|
2017-08-08 11:25:20 |
O Me, O My! Android O and Its Impact on the Enterprise (lien direct) |
Google's Android O version 8.0 features a safe browsing API and other functions to improve mobile application security in the enterprise.
|
|
|
|
|
2017-08-08 09:00:23 |
From the Battlefield to the Security Operations Center: A New Collar Approach to the Skills Gap (lien direct) |
Many companies, including IBM, are taking a new collar approach and recruiting ex-military personnel to fill woefully understaffed cybersecurity positions.
|
|
|
|
|
2017-08-07 12:35:20 |
Threat Hunting Services Are Now a Basic Necessity (lien direct) |
EDR solutions enable threat hunting teams to fine-tune behavioral detection rules and determine the techniques by which malware spreads through a network.
|
|
|
|
|
2017-08-07 12:00:40 |
Security Monitoring and Analytics: From Tools to Platforms (lien direct) |
An evolved security monitoring and analytics platform - as opposed to a tools-based approach - can help analysts make better use of available threat data.
|
|
|
|
|
2017-08-07 11:20:25 |
Ransomware, Trojans and Fraud, Oh My! Tracking Recent Cybercrime Trends and Patterns (lien direct) |
As banking and retail institutions adopt stronger security measures, cybercrime trends are shifting to maximize fraudsters' ROI.
|
|
|
|
|
2017-08-04 13:10:21 |
Hire a Team of Hackers to Identify Vulnerabilities (lien direct) |
Many companies have adopted the practice of recruiting a team of hackers to poke holes in their networks and assess their incident response capabilities.
|
|
|
|
|
2017-08-04 11:00:23 |
Pervasive Encryption Simplifies Mainframe Security (lien direct) |
With the new pervasive encryption feature in the IBM z14 mainframe server, customers can protect data without changing or adjusting applications.
|
|
|
|
|
2017-08-03 11:50:21 |
Master the Basics to Manage IoT Security Risks (lien direct) |
Security measures are most effective when built in during the design phase. To achieve this, companies must understand basic facts about IoT security.
|
|
|
|
|
2017-08-03 10:50:19 |
Why Red on Blue Is a Crucial Component of Cyber Skills and Incident Response Training (lien direct) |
Companies can use incident response training programs such as capture the flag and red on blue exercises to bridge the cybersecurity skills gap.
|
|
|
|
|
2017-08-03 06:50:21 |
IBM Scores a Strong Performer Placement in Risk-Based Authentication Wave (lien direct) |
IBM was recognized as a Strong Performer in "The Forrester Wave: Risk Based Authentication, Q3 2017," earning the highest possible score in two categories.
|
|
|
|
|
2017-08-02 11:50:19 |
Caveat Emptor: Identifying Insider Threats Acquired From Mergers and Acquisitions (lien direct) |
During mergers and acquisitions, companies should conduct third-party risk assessments to identify insider threats that might be lurking on the network.
|
|
|
|
|
2017-08-02 11:00:20 |
Integrating the IoT Into Your Application Security Program (lien direct) |
Is your network prepared to handle the IoT? Start by focusing on your application security program, since many IoT threats lurk in the application layer.
|
|
|
|
|
2017-08-01 11:45:19 |
Make Attorney-Client Privilege Part of Your Incident Response Strategy (lien direct) |
Attorney-client privilege can be a key asset to an organization's incident response strategy in the event of a security breach.
|
|
|
|
|
2017-08-01 10:55:17 |
To Fight Cybercriminals, Follow the Money Trail (lien direct) |
Most cybercriminals are after money. To safeguard your network from money-hungry fraudsters, you need to know where your most valuable assets are stored.
|
|
|
|
|
2017-07-31 14:25:17 |
Why Is Identity Governance So Difficult to Get Right? (lien direct) |
To maximize the value of identity governance, organizations should tailor their IAM programs to suit business needs and priorities.
|
|
|
|