Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2018-07-27 12:35:05 |
Bridging the Divided Perspectives on SOC Tech and Talent (lien direct) |
>There's a significant divide between perceptions of SOC technology, talent and other key operations issues among analysts, directors and executives, according to the findings of a recent report.
|
|
|
|
|
2018-07-27 12:00:05 |
Managing Enterprise Security Risk on Vacation (lien direct) |
>Enterprise data and devices require additional safeguarding wherever your employee takes them - especially on vacation. Some basic user education can greatly reduce security risk.
|
|
|
|
|
2018-07-27 11:35:05 |
Incident Response Under GDPR: What to Do Before, During and After a Data Breach (lien direct) |
>With GDPR in full swing, organizations need to prepare their incident response plans to move swiftly in the event of a breach and meet the mandated 72-hour incident disclosure window.
|
Data Breach
|
|
|
|
2018-07-26 14:25:05 |
(Déjà vu) Gartner Releases First-Ever Magic Quadrant for Unified Endpoint Management (UEM) (lien direct) |
>IBM was named a leader in the 2018 Magic Quadrant for Unified Endpoint Management Tools report for its completeness of vision and ability to execute.
|
Guideline
|
|
|
|
2018-07-26 12:15:05 |
Four Steps to Close the Window on Critical Vulnerabilities (lien direct) |
>Critical vulnerabilities often remain unaddressed when an organization is unwilling to allocate resources to routinely update applications. Take steps now to secure your network against exploitation.
|
|
|
|
|
2018-07-25 12:16:00 |
How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2 (lien direct) |
>In the external reconnaissance and launch attack phases of the X-Force IRIS cyberattack preparation framework, threat actors look for vulnerabilities and tailor their attacks to exploit them.
|
Threat
|
|
|
|
2018-07-25 11:55:00 |
10 Key Findings From the Ponemon Institute Value of Artificial Intelligence in Cybersecurity Study (lien direct) |
>According to a new study conducted by the Ponemon Institute and sponsored by IBM, organizations could save an average of $2.5 million in operating costs by deploying artificial intelligence (AI).
|
|
|
|
|
2018-07-25 11:40:05 |
Here\'s How the University of Bari Is Tackling the Cybersecurity Skills Shortage (lien direct) |
With support from IBM, the University of Bari Aldo Moro in Italy is developing a curriculum to help students develop the cybersecurity skills they need to work in a security operations center (SOC).
|
|
|
|
|
2018-07-24 14:21:01 |
Quantum Leaps and Bounds: Why Quantum Computing Will Have a Positive Impact on Cybersecurity (lien direct) |
>Despite the risks quantum computing might pose to organizations, this emerging technology also promises to enhance cybersecurity capabilities such as SIEM, incident response and data protection.
|
|
|
|
|
2018-07-24 11:00:05 |
How Open Source Intelligence Could Save Your Network (lien direct) |
>Open source intelligence enables analysts to identify threats and uncover details about attacker behavior to improve their decision-making around incident response.
|
|
|
|
|
2018-07-24 10:20:05 |
BYOD: Are Thousands of Rogue Devices Lurking on Your Network? (lien direct) |
>While securing the variety of known devices on your network is hard work, it may feel impossible to manage uninvited guests. Here's how to effectively manage rogue devices.
|
|
|
|
|
2018-07-23 11:15:05 |
How Pivoting Can Help Your Incident Response Process (lien direct) |
>Indicators of compromise are key data points used during an incident response process. Regularly testing the reliability of your indicators can make all the difference in your IT security process.
|
|
|
|
|
2018-07-20 11:50:05 |
Six Tips for Recruiting and Retaining Women in Security Roles (lien direct) |
>As the number of unfilled cybersecurity positions increases, women in security remain grossly underrepresented. New data shows the deep-seated changes that must be made to turn these trends around.
|
|
|
|
|
2018-07-20 11:30:05 |
New NIST Guidebook Says Cybersecurity Is Everyone\'s Job - Here\'s Why (lien direct) |
The 2018 NIST guidebook offers holistic, deeply integrated strategies for enterprise security, including establishing broad cultural standards for risk management.
|
|
|
|
|
2018-07-19 11:15:05 |
Why the Best Defense Is a Good Offensive Security Strategy (lien direct) |
>Offensive security activities like cyberattack simulations, penetration testing and vulnerability assessments can help companies identify and remediate flaws before cybercriminals can exploit them.
|
Vulnerability
|
|
|
|
2018-07-19 10:50:05 |
How Will Healthcare Cybersecurity Issues Impact Acquisitions? (lien direct) |
>Healthcare cybersecurity is now the primary concern during acquisitions in this expanding industry. Business owners can take proactive steps to secure digital infrastructure before issues arise.
|
|
|
|
|
2018-07-18 15:15:05 |
How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1 (lien direct) |
>The IBM X-Force IRIS cyberattack preparation and execution frameworks aim to help security teams predict threat actors' motives and tactics and communicate security intelligence more clearly.
|
Threat
|
|
|
|
2018-07-18 11:12:01 |
What\'s On the Horizon for SIEM Technology? Five Upcoming Innovations in Security Analytics (lien direct) |
As cloud adoption increases, the IT skills gap widens and the threat landscape becomes more sophisticated, innovations in SIEM technology will revolutionize the way SOCs perform security analytics.
|
Threat
|
|
|
|
2018-07-18 11:05:04 |
Digital Strategy Isn\'t Meeting Security Needs - Here\'s What to Do (lien direct) |
IT professionals often find their digital strategy is not keeping pace with the ongoing digital transformation. Accountability needs to be more broadly distributed to secure data adequately.
|
|
|
|
|
2018-07-17 12:20:05 |
Key Questions for Effective Cyber Risk Management From the ISO 31000:2018 (lien direct) |
>ISO 31000:2018 details best practices for managing organizational cyber risk. Explore some of the key questions to address when evaluating the efficacy of your risk-management process.
|
|
|
|
|
2018-07-17 11:45:05 |
Move Over, Ransomware: Why Cybercriminals Are Shifting Their Focus to Cryptojacking (lien direct) |
>Instead of seeking financial gains with ransom demands, threat actors are now aiming to steal central processing unit (CPU) and graphics processing unit (GPU) resources to facilitate cryptojacking.
|
Threat
|
|
|
|
2018-07-13 16:30:05 |
Security Analysts Are Overworked, Understaffed and Overwhelmed - Here\'s How AI Can Help (lien direct) |
Today's security teams lack the time, talent and resources to keep up with the rapidly evolving threat landscape. AI can automate tedious processes and take some pressure off security analysts.
|
Threat
|
|
|
|
2018-07-13 13:25:05 |
Think You\'ve Got Nothing to Hide? Think Again - Why Data Privacy Affects Us All (lien direct) |
Many consumers are willing to volunteer their personal information for the sake of convenience, but it's important to understand that data privacy affects not only individuals but entire communities.
|
|
|
|
|
2018-07-12 12:25:04 |
Understanding SIEM Technology: How to Add Value to Your Security Intelligence Implementation (lien direct) |
>As the threat landscape expands - and IT skills grow increasingly scarce - many security leaders don't know how to get the most out of their security information and event management (SIEM) solution.
|
Threat
Guideline
|
|
|
|
2018-07-12 12:15:04 |
Why It\'s Time to Cross Out the Checklist Approach to Vendor Security (lien direct) |
When it comes to vendor security, all the handshakes and paperwork that go into a business deal tend to get in the way of proper audits and thorough vulnerability assessments.
|
Vulnerability
|
|
|
|
2018-07-11 12:00:05 |
Calculating the Cost of a Data Breach in 2018, the Age of AI and the IoT (lien direct) |
>The 2018 Cost of a Data Breach Study from Ponemon Institute reveals that the total cost, per-capita cost and average size of a data breach have all increased year over year.
|
Data Breach
|
|
|
|
2018-07-11 10:20:04 |
The GDPR Evolution: A Letter to the CISO (lien direct) |
>To keep GDPR compliance efforts on track, security leaders must collaborate across departments, invest in robust tools and services and adopt a risk-based approach to handling customer data.
|
Guideline
|
|
|
|
2018-07-10 11:20:01 |
Anubis Strikes Again: Mobile Malware Continues to Plague Users in Official App Stores (lien direct) |
>IBM X-Force reported that mobile malware developers uploaded at least 10 malicious downloader apps to the Google Play Store as the first step in a process that fetches BankBot Anubis.
|
Malware
|
|
|
|
2018-07-09 12:05:04 |
Why Multifactor Authentication Is Crucial to Strengthen Mainframe Security (lien direct) |
>By adopting a multifactor authentication (MFA) solution for mainframe security, organizations can protect their most sensitive assets from cybercriminals looking to exploit stolen credentials.
|
|
|
★★★★★
|
|
2018-07-09 11:30:04 |
How to Get Directors On Board With Cyber Risk Governance (lien direct) |
>The latest report from the DCRO urged top leadership to become more engaged in cyber risk governance and to hold all departments - not just IT - accountable for proper security hygiene.
|
Guideline
|
|
|
|
2018-07-09 11:20:04 |
A Brief History of iOS: The Evolution of MDM and Enterprise Mobility (lien direct) |
>As the mobile threat landscape has expanded over the past decade, Apple's iOS releases have added new MDM features to help security professionals protect enterprise networks.
|
Threat
|
|
|
|
2018-07-06 13:25:04 |
What\'s the Best Strategy to Manage Application Security Risk? (lien direct) |
To protect their organizations from threat actors targeting software vulnerabilities, security leaders should adopt an integrated approach to application security risk management.
|
Threat
Guideline
|
|
|
|
2018-07-06 13:25:04 |
Generation Gap: Does Your Security Awareness Program Bridge the Divide? (lien direct) |
>As more millennials enter the workforce, organizations should consider different approaches to security awareness training to account for generational knowledge gaps.
|
|
|
|
|
2018-07-06 10:00:03 |
72 Hours: How a Data Breach Response Plan Can Help You Meet the GDPR Notification Deadline (lien direct) |
>Without a data breach response plan, companies will find it difficult to disclose security incidents within 72 hours as required by the General Data Protection Regulation (GDPR).
|
Data Breach
|
|
|
|
2018-07-05 11:20:04 |
How Can We Make Smart Cities Even Smarter? Start With Security Intelligence (lien direct) |
>Governments must embrace an immune system approach centered on security intelligence to stay ahead of advanced cyberthreats looking to breach the ever-widening perimeter of smart cities.
|
|
|
|
|
2018-07-03 12:05:03 |
Why UEM Is the New MDM: The Latest Stage in Enterprise Evolution (lien direct) |
>In addition to protecting laptops, smartphones, tablets and IoT devices, AI-powered UEM solutions can help security leaders manage apps, content, data and user identity and access more efficiently.
|
Guideline
|
|
|
|
2018-07-03 11:20:03 |
June\'s Cybersecurity Recap: The Evolving Cybersecurity Career Pathway (lien direct) |
In June's security news, IT experts and educators around the world worked to create a new cybersecurity career pathway through initiatives designed to alleviate the industrywide skills shortage.
|
|
|
★★
|
|
2018-07-03 11:00:03 |
What Security Lessons Can Large Enterprises Learn From Small Businesses? (lien direct) |
>Large enterprises can learn crucial security lessons from small and midsized organizations - which often have a stronger culture of accountability and responsibility when it comes to data protection.
|
|
|
★★★
|
|
2018-07-02 15:15:04 |
Behind the Scenes of the Science Channel Special, \'Dark Web: Fighting Cybercrime\' (lien direct) |
IBM Security teamed up with Atomic Entertainment and Science Channel to produce a documentary about the nature of the Dark Web and innovations in the security industry.
|
|
|
★★
|
|
2018-07-02 15:10:03 |
What\'s Holding Back GDPR Compliance Efforts? (lien direct) |
Organizations can fast-track their GDPR compliance efforts by focusing on three crucial areas: awareness and understanding; accountability and responsibility; and resources and support.
|
|
|
|
|
2018-07-02 15:03:00 |
It\'s Time to Take Advantage of Multifactor Authentication for Mainframe Security (lien direct) |
The increasing sophistication of the threat landscape is influencing organizations to adopt multifactor authentication to protect data on all kinds of systems, from mobile phones to mainframes.
|
Threat
|
|
|
|
2018-06-29 12:00:03 |
Hiring IT Professionals? Here\'s Why Your Recruitment Process Is All Wrong (lien direct) |
As companies grow, the process of hiring IT professionals becomes increasingly tedious, putting them at risk of missing out on top talent.
|
|
|
|
|
2018-06-29 10:55:03 |
The Cybercrime Landscape Is Evolving - Will Your Mobile Threat Defense Strategy Keep Up? (lien direct) |
>As the workforce embraces mobility to increase productivity, organizations must adopt a more innovative, dynamic approach to mobile threat defense.
|
Threat
|
|
|
|
2018-06-28 13:15:05 |
Goal! Spam Campaigns Capitalize on the World Cup Craze (lien direct) |
>IBM X-Force researchers observed several ongoing spam campaigns tied to the World Cup - many of which used the official branding of tournament sponsors to lure victims.
|
Spam
|
|
|
|
2018-06-28 11:45:03 |
4 Tips to Creatively Close the Information Security Skills Gap (lien direct) |
>Hiring managers have lamented the so-called cybersecurity skills gap for many years, but some recruiters have found creative ways to solve this problem.
|
|
|
|
|
2018-06-27 11:40:03 |
Eight Critical IDaaS Capabilities to Optimize Your IAM Strategy in the Cloud (lien direct) |
>By investing in IDaaS capabilities, organizations can free themselves from the burdens of infrastructure support and specialized staffing required to operate common on-premises solutions.
|
|
|
|
|
2018-06-27 11:25:03 |
What Is Transparency\'s Role in Establishing Digital Trust With Consumers? (lien direct) |
Transparency is a critical factor for consumers when establishing digital trust with companies and service providers due to increasing concerns about data privacy.
|
|
|
|
|
2018-06-27 11:10:04 |
The Key to Protecting Your Crown Jewels? Improve Risk Management (lien direct) |
>Experts at the 2018 RSA Conference demonstrated how increasing collaboration and accountability around cyber risk management is the best way to protect your critical assets.
|
|
|
|
|
2018-06-26 13:00:03 |
Why Your Teen Should Develop Hacking Skills This Summer (lien direct) |
>Hacking skills promote empathy, grit and creative problem solving - characteristics that can take teens far in their future careers, whether they pursue cybersecurity or any other field of study.
|
|
|
★★★
|
|
2018-06-26 11:00:03 |
How to Deliver Frictionless Digital Trust With Pinpoint Accuracy (lien direct) |
>Companies that lack the resources to establish digital trust seamlessly, via a frictionless online experience, risk incurring high abandonment rates and low net promoter scores (NPS).
|
|
|
★★★★
|