Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2021-08-17 05:34:56 |
FireEye Launches XDR Platform to Help Security Operations Teams (lien direct) |
FireEye has launched FireEye XDR, a unified platform designed to help security operations teams strengthen threat detection, accelerate response capabilities, and simplify investigations.
|
Threat
|
|
★★★★★
|
|
2021-05-26 07:26:00 |
Five Practical Steps to Implementing a Zero-Trust Network (lien direct) |
How should organizations go about applying a Zero Trust blueprint across their complex hybrid networks? Here are five key steps. |
|
|
|
|
2021-04-21 13:59:07 |
Facebook Shuts Down Two Hacking Groups in Palestine (lien direct) |
Facebook says it has taken action against two groups of hackers originating from Palestine that abused its infrastructure for malware distribution and account compromise across the Internet.
|
Malware
|
|
★★★
|
|
2021-04-13 15:05:00 |
Cloud Security Alliance Shares Security Guidance for Crypto-Assets Exchange (lien direct) |
The Cloud Security Alliance (CSA) has released new Crypto-Asset Exchange Security Guidelines, a set of guidelines and best practices for crypto-asset exchange (CaE) security.
|
|
|
|
|
2021-03-08 19:11:40 |
Intel Corp. to Speak at SecurityWeek Supply Chain Security Summit (lien direct) |
Join Intel on Wednesday, March 10, at SecurityWeek's Supply Chain Security Summit, where industry leaders will examine the current state of supply chain attacks. Hear Intel's experts discuss the need for transparency and integrity across the complete product lifecycle, from build to retire.
|
Guideline
|
|
|
|
2021-02-24 14:34:33 |
GitHub Hires Former Cisco Executive Mike Hanley as Chief Security Officer (lien direct) |
Software development platform GitHub announced on Wednesday that it has hired Mike Hanley as its new Chief Security Officer (CSO). |
|
|
|
|
2021-02-22 19:23:43 |
(Déjà vu) Reddit Names Allison Miller as Chief Information Security Officer (CISO) (lien direct) |
Social news community site Reddit announced has hired Allison Miller as Chief Information Security Officer (CISO) and VP of Trust.
|
|
|
|
|
2020-12-17 06:26:00 |
Why Cyber Security Should Be at the Top of Your Christmas List (lien direct) |
To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks in ways beyond those traditionally handled by the information security function. |
|
|
|
|
2020-12-17 04:26:12 |
United States Federal Government\'s Shift to Identity-Centric Security (lien direct) |
Governments are increasingly facing new legislation, standards, frameworks, and policies to protect critical and sensitive information.
|
|
|
|
|
2020-10-21 05:40:26 |
How Extreme Weather Will Create Chaos on Infrastructure (lien direct) |
Extreme weather events will soon become more frequent and widespread, devastating areas of the world that typically don't experience them and amplifying the destruction in areas that do. |
|
|
|
|
2020-10-21 05:35:48 |
BSIMM11 Observes the Cutting Edge of Software Security Initiatives (lien direct) |
In addition to helping an organization start an SSI, the BSIMM also gives them a way to evaluate the maturity of their SSI. |
|
|
|
|
2020-10-21 05:27:02 |
Sustaining Video Collaboration Through End-to-End Encryption (lien direct) |
By infusing end-to-end encryption into any video strategy, it ensures not only the sustainability of the channel, but the businesses that rely on it. |
|
|
|
|
2020-09-08 03:20:44 |
Will Robo-Helpers Help Themselves to Your Data? (lien direct) |
Are you sure that your robo-helpers are secure? |
|
|
|
|
2020-09-02 03:30:22 |
Securing the Hybrid Workforce Begins with Three Crucial Steps (lien direct) |
The global shift to a remote workforce has redefined the way organizations structure their business models. |
|
|
|
|
2020-08-26 01:49:34 |
A New Strategy for DDoS Protection: Log Analysis on Steroids (lien direct) |
Incorporating a data lake philosophy into your security strategy is like putting log analysis on steroids. |
|
|
|
|
2020-08-26 00:53:31 |
COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider (lien direct) |
Despite the COVID-19 pandemic, companies are obligated to comply with many laws governing data security and privacy |
|
|
|
|
2020-08-12 12:08:01 |
SecurityWeek Extends ICS Cyber Security Conference Call for Presentations to August 31, 2020 (lien direct) |
The official Call for Presentations (speakers) for SecurityWeek's 2020 Industrial Control Systems (ICS) Cyber Security Conference, being held October 19 – 22, 2020 in SecurityWeek's Virtual Conference Center, has been extended to August 31st.
|
|
|
|
|
2020-08-12 07:18:27 |
SecurityWeek to Host Cloud Security Summit Virtual Event on August 13, 2020 (lien direct) |
SecurityWeek will host its 2020 Cloud Security Summit virtual eventon Thursday, August 13, 2020. |
|
|
|
|
2020-08-11 09:22:00 |
Avoiding Fuelling the Cyber-Crime Economy (lien direct) |
What drives the cyber-crime economy, and how can organizations prevent their data being used as a criminal commodity? |
|
|
|
|
2020-08-10 11:16:00 |
Expect Behavioral Analytics to Trigger a Consumer Backlash (lien direct) |
The deployment of cameras, sensors and applications in public and private places for behavioral analytics will be followed by consumer and regulatory backlash. |
|
|
|
|
2020-08-10 10:15:57 |
Holding public cloud security to account (lien direct) |
The public cloud provides great flexibility and cost management for organizations, but what about security? |
|
|
|
|
2020-08-10 10:12:04 |
No Silver Bullet for Addressing Cybersecurity Challenges During Pandemic (lien direct) |
As the coronavirus pandemic forced organizations to migrate to a work-from-home context, security professionals faced new challenges. |
|
|
|
|
2020-08-10 10:04:24 |
Could the Twitter Social Engineering Hack Happen to You? (lien direct) |
The phishing attack on Twitter employees serves as an opportunity for all businesses to reassess how they build and deploy application |
Hack
|
|
|
|
2020-07-08 00:38:48 |
Augmented Reality Will Compromise the Privacy and Safety of Attack Victims (lien direct) |
Augmented Reality (AR) technologies will provide new opportunities for attackers to compromise the privacy and safety of their victims. |
|
|
|
|
2020-07-08 00:34:00 |
Ending the Cloud Security Blame Game (lien direct) |
Security is primarily your responsibility – with help from the cloud provider. |
|
|
|
|
2020-06-13 07:29:00 |
Edge Computing Set to Push Security to the Brink (lien direct) |
In the coming years, poor implementation of edge computing solutions will leave organizations open to attack. |
|
|
|
|
2020-06-13 05:24:00 |
Make It So: Accelerating the Enterprise with Intent-Based Network Security (lien direct) |
How organizations can realize the benefits of intent-based networking across their hybrid networks. |
|
|
|
|
2020-05-01 14:32:41 |
Threat Horizon 2022: Cyber Attacks Businesses Need to Prepare for Now (lien direct) |
Information security professionals are facing increasingly complex threats-some new, others familiar but evolving. |
Threat
|
|
|
|
2020-04-07 02:07:01 |
Why the Latest Marriott Breach Should Make Us "Stop and Think" About Security Behaviors (lien direct) |
Marriott International has experienced their second data breach |
Data Breach
|
|
|
|
2020-03-29 11:14:03 |
Google Skips Chrome 82, Resumes Stable Releases (lien direct) |
Google is on track to resume the roll-out of stable Chrome releases next week, but says it will skip one version of the browser. |
|
|
|
|
2020-03-27 11:37:36 |
Examining Potential Election Vulnerabilities: Are They Avoidable? (lien direct) |
Election security is a large concern because so many aspects of it can be insecure |
|
|
|
|
2020-03-27 11:14:31 |
Benchmarking the State of the CISO in 2020 (lien direct) |
A run-down of Cisco's 2020 CISO Benchmark Report. |
|
|
|
|
2020-03-03 08:30:41 |
Cyberattacks a Top Concern for Gov Workers (lien direct) |
More than half of city and state employees in the United States are more concerned about cyberattacks than they are of other threats, a new study discovered.
|
|
|
|
|
2020-02-19 20:10:35 |
Hackers Target Online Gambling Sites (lien direct) |
Gambling and betting operations in Southeast Asia have been targeted in a campaign active since May 2019, Trend Micro reports.
|
|
|
|
|
2020-02-11 13:13:38 |
When Data Is Currency, Who\'s Responsible for Its Security? (lien direct) |
With recent security incidents, we've caught a glimpse of the role that data enrichment, aggregators and brokers play in security. What type of responsibility do these parties bear in protecting consumer data and privacy? |
|
|
|
|
2020-01-30 14:09:56 |
SEC Shares Cybersecurity and Resiliency Observations (lien direct) |
The U.S. Securities and Exchange Commission (SEC) has published a report detailing cybersecurity and operational resiliency practices that market participants have adopted.
|
|
|
|
|
2020-01-17 09:46:22 |
What Does Being Data-Centric Actually Look Like? (lien direct) |
Data-centric approaches are a powerful way of increasing the adaptability and profitability of your business. |
|
|
★★★★
|
|
2020-01-17 09:37:38 |
The Big 3: Top Domain-Based Attack Tactics Threatening Organizations (lien direct) |
Attackers often buy 'look-alike' domains in order to impersonate a specific brand online. |
|
|
★★★★
|
|
2020-01-17 08:39:00 |
Security Compass Receives Funding for Product Development and Expansion (lien direct) |
Toronto, Canada-based Security Compass has received additional funding from growth equity investment firm FTV Capital. |
|
|
|
|
2020-01-15 14:25:53 |
Password Shaming Isn\'t Productive – Passwords Are Scary Business (lien direct) |
With the complexity of consumer devices only increasing, contextual security should be a priority for all – a situation which would avoid password shaming. |
|
|
★★★★
|
|
2020-01-14 07:21:00 |
Five Key Cyber-Attack Trends for This Year (lien direct) |
5 key cyber-attack trends that are expected to develop during the coming months. |
|
|
★★★★★
|
|
2020-01-13 12:20:00 |
20/20 Vision on 2020\'s Network Security Challenges (lien direct) |
Organizations will likely need to embrace more automation across all security and compliance-related processes. |
|
|
★★★
|
|
2020-01-13 12:14:18 |
Is Cybersecurity Getting Too Complex? (lien direct) |
To find the right services that complement specific resource gaps, enterprises should first fully assess their own security current state. |
|
|
★★★★
|
|
2020-01-08 14:43:21 |
Global Security Threats Organizations Must Prepare for in 2020 (lien direct) |
To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks in ways beyond those traditionally handled by the information security function. |
|
|
|
|
2019-12-19 15:32:54 |
Six Reasons for Organizations to Take Control of Their Orphaned Encryption Keys (lien direct) |
Enforcing encryption key management can effectively bridge the gaps in your enterprise privileged access security strategy. |
|
|
|
|
2019-12-18 00:11:22 |
The Cybersecurity Skills Gap: An Update for 2020 (lien direct) |
2020 will be a critical juncture for the entire cybersecurity sector |
|
|
|
|
2019-12-18 00:05:19 |
Modernizing Web Filtering for K-12 Schools (lien direct) |
Today's 24/7 Internet access world underlines the importance of fine-tuned web filters and content security across K-12 networks. |
|
|
|
|
2019-12-04 12:01:48 |
University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers (lien direct) |
University of Arizona-led teams will be more proactive in the battle against cyberthreats thanks to nearly $1.5 million in grants from the National Science Foundation. |
|
|
|
|
2019-11-19 09:16:54 |
Securing the Internet of Things (IoT) in Today\'s Connected Society (lien direct) |
The rush to adoption has highlighted serious deficiencies in both the security design of Internet of Things (IoT) devices and their implementation. |
|
|
|
|
2019-11-14 07:59:00 |
What Is Next Generation SIEM? 8 Things to Look For (lien direct) |
Effective next generation SIEM should provide better protection and equally important, if not more, a much more effective, next gen user experience. |
|
|
|