Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-24 10:51:06 |
Can You Still Protect Your Most Sensitive Data? (lien direct) |
Companies in Silicon Valley and beyond are questioning how they should be protecting their sensitive data — if they choose to keep it at all. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-23 11:46:07 |
Beat the Right Threats to the Pass With Security Intelligence (lien direct) |
Security intelligence helps analysts focus on the threats that are most critical to their environment, but it must have the right information to work. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-22 16:30:07 |
GozNym: Living in America (lien direct) |
IBM X-Force researchers recently reported that the GozNym banking malware in executing redirection attacks on banks in the U.S. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-22 10:36:06 |
When E-commerce Security Meets Brick-and-Mortar Retail (lien direct) |
The line between physical storefronts and online retail is blurring, and as a result, e-commerce security is getting more complicated. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-21 11:01:06 |
The Quantum Security Prognosis: Remote Health Care and the Edge of the Internet (lien direct) |
The future of the health care industry could lie in quantum security: This advanced technology has the potential to secure critical data efficiently. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-20 11:41:04 |
The Always-On Culture + Mobile Access = IT Nightmare? (lien direct) |
Managing mobile access is an IT nightmare in today's always-on corporate environment, and security teams need all the help they can get. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-20 08:16:06 |
GDPR: How to Prepare in the Calm Before the Storm (lien direct) |
The General Data Protection Regulation (GDPR) has finally arrived in the EU. Here's what organizations around the world can do to be prepared. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-17 11:11:05 |
Ransomware: An Ounce of Prevention Is Worth a Pound of Cure (lien direct) |
The "Ransomware Response Guide" can help your organization prepare for preventing this common threat or validate your existing security policies. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-17 10:45:41 |
Tax Havens and Criminal Activity (lien direct) |
Tax havens around the world act as legal shelters for organized crime groups, wealthy individuals, multinational corporations and more. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-16 12:00:04 |
Power Your Response With Incident Visualization (lien direct) |
Resilient Incident Visualization graphically displays relationships between indicators of compromise and incidents in an organization's environment. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-15 16:01:05 |
Uncovering Risk From SAP HANA Vulnerabilities Can Be Simple and Easy (lien direct) |
Vulnerabilities in a SAP HANA system can result in major consequences for users, but identifying and remediating these issues can be easy. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-15 10:00:03 |
Lessons Learned From 11 Years of Cost of Data Breach Research (lien direct) |
The Ponemon Institute's annual Cost of Data Breach surveyed 383 organizations to determine the financial impact of a security incident. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-14 12:06:04 |
Threat Intelligence Currency in the API Economy (lien direct) |
Threat intelligence is a critical source of information that can enrich most security products and defensive strategies. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-14 09:11:04 |
Does the Security Industry Have an Immune System Problem? (lien direct) |
Businesses need to build a cybersecurity immune system where various parts interact and work together to detect, prevent and eradicate breaches. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-13 13:11:05 |
Access Controls and the Inability to Keep Up (lien direct) |
The mindset of prescribing one-dimensional access controls hasn't been effective, so enterprises are now shifting toward end-to-end controls. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-13 10:36:02 |
Handling Code of Conduct and Acceptable Computer Usage Violations (lien direct) |
Most companies have rules in place for monitoring computer usage violations, but they're often neither the most practical nor effective systems. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-10 11:21:03 |
Retail Security: Industry Provides Rich Pickings for Cybercriminals (lien direct) |
Retail security presents a huge challenge for organizations in the industry, but it is essential that they enact a holistic security strategy. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-09 12:11:03 |
A Double-Edged Sword: IAM Meets IoT (lien direct) |
The changing nature of the IoT is bringing new challenges related to identity and access management. Are you ready for the Identity of Things? |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-09 07:51:04 |
Botnet Detection Advances With the Use of Big Data Analysis in Europe (lien direct) |
The European Union is embracing new methods of botnet detection to fight cybercrime and improve the security of member nations. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-08 11:11:03 |
Why Do Some Identity Governance Strategies Fail? (lien direct) |
Identity governance strategies may fail for any number of reasons. Check out some common culprits so you can steer clear during your implementation. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-07 14:06:02 |
Is Mobile Banking Safe? (lien direct) |
Mobile banking is becoming more popular, but as it grows the risks become bigger as well. Are financial institutions protecting their customers? |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-07 10:41:01 |
Retail IT Professionals Feel More Prepared for Data Breaches (lien direct) |
A recent survey showed that retail IT professionals feel they are prepared for data breaches, though other data doesn't fully support their belief. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-06 10:51:01 |
Mobile Security: Still Important, Still Challenging (lien direct) |
The mobile transformation of the enterprise is just beginning. And according to a new IBM study, mobile security is already a must-have for organizations. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-03 20:31:02 |
Compromised Before My Very Eyes: How I Almost Got Hacked (lien direct) |
Here's the story of how I almost got hacked — and what you can learn from my close call to ensure the data breach doesn't happen to you. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-03 10:21:03 |
Inside the Mind of a Hacker: Attacking the Memory (lien direct) |
A savvy hacker may identify vulnerabilities that lead to memory attacks. Learn what contributes to these issues and best practices for avoiding them. |
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-02 11:51:00 |
Cybersecurity Today Heads to the Future (lien direct) |
Cognitive computing systems have advanced at a remarkable rate in recent years and are able to contribute tremendously to cybersecurity today. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-02 09:01:02 |
Marcher Mobile Bot Adds UK Targets, Steps Up Banking Fraud Capabilities (lien direct) |
The Marcher mobile bot is a new Android malware targeting a long list of banks around the world with app overlay screens and SMS hijacking. |
|
|
★★★★★
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-01 14:06:01 |
Safeguard Health Care Identities and Data With Identity Governance and Intelligence (lien direct) |
Identity governance and intelligence solutions are poised to help health care organizations secure personal data and electronic medical records. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-06-01 11:05:59 |
How to Protect Your Website From XSS Vulnerabilities With IBM Application Security (lien direct) |
Application security practices and tools can help ensure that embarrassing and costly vulnerabilities are shut out of your website or app. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-31 12:01:03 |
Quantum Computing Comes to the Cloud (lien direct) |
IBM's introduction of quantum computing services on the cloud could change cybersecurity, cryptography and testing methods as we know it. |
|
|
★★
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-31 09:50:59 |
Retail Security Risks: 2016 Midyear Roundup (lien direct) |
Halfway through 2016, it's time for organizations to look over their retail security risks and survey the landscape for the rest of the year. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-29 15:50:58 |
The InfoSecond, Week of May 30, 2016 (lien direct) |
This week's InfoSecond is packed with the latest security news, including a ransomware attack on Amazon users and tips for preventing a social media hack. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-27 13:00:59 |
Bug Poaching: A New Extortion Tactic Targeting Enterprises (lien direct) |
Bug poaching may not feel as severe as full-blown advanced attacks that expose your data to the public, but you should treat them just as seriously. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-27 10:30:58 |
2016 Security Conferences: Infosecurity Europe (lien direct) |
Infosecurity Europe will take London by storm in June, and attendees will have many opportunities to learn about the latest security trends. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-26 10:55:55 |
Browser Vendors Are Shutting Down SHA-1 Digital Certificates (lien direct) |
Web browsers are moving away from SHA-1 digital certificates, and organizations need to make sure they are in line with more secure measures. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-25 13:40:58 |
How to Prevent a Social Media Hack (lien direct) |
Avoiding a damaging and embarrassing social media hack starts with building security into all aspects of the organization and embracing best practices. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-25 10:35:56 |
Proactive Cybersecurity: Defending Industrial Control Systems From Attacks (lien direct) |
Proactive cybersecurity solutions are needed to protect critical industrial control systems from the growing risk of cyberattacks. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-24 12:35:56 |
Three Effective Ways to Make Application Security Testing a Successful Part of Your DevOps Program (lien direct) |
Organizations must learn the best methods for addressing application security testing challenges within their DevOps environment. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-24 10:15:58 |
Q1 2016 Saw a Record High for Ransomware (lien direct) |
The first quarter of 2016 had a record high for ransomware infections, highlighting the need for better backup and restoration strategies. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-23 11:20:57 |
The Path to Cybersecurity Confidence Starts With Penetration Testing (lien direct) |
Penetration testing is an ideal way for enterprises to assess their existing security systems, identify gaps and locate the right solutions. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-23 08:00:58 |
How to Fix the Cybersecurity Blind Spot That Is Shadow IT (lien direct) |
Taking advantage of security technology that can help protect against the blind spot challenges of shadow IT makes perfect sense. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-20 11:05:57 |
The Multitude of Threat Vectors Vehicle Area Networks Create (lien direct) |
The vehicle area networks used by autonomous vehicles will need to protected with the most sophisticated security measures available. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-19 11:15:55 |
The Secret to Real-Time Endpoint Inspection (lien direct) |
The secret to real-time endpoint inspection is using tools that can ask questions, find data, share results and fix the symptoms. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-19 06:45:54 |
Podcast: Blockchain Technology and the Future of Security (lien direct) |
Luke Sully of IBM Security recently discussed the future of blockchain technology as it relates to security with TechTank's Dominic Halpin. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-18 13:25:55 |
Five Resources to Help You Deploy an Effective Mobile Security Strategy (lien direct) |
Here are five resources that will help enterprises create and deploy an effective mobile security strategy that meets all business and security needs. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-18 10:50:54 |
Verizon\'s 2016 DBIR: Humans Remain the Weakest Link (lien direct) |
The Verizon 2016 DBIR revealed that many established attack vectors are still effective. Organizations need to embrace possible security solutions. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-17 13:41:07 |
Integrated Steps to Stay Ahead of Malicious Insiders (lien direct) |
It is essential to allow access to data for your workforce, but you also must quickly detect and stop malicious insiders before they cause damage. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-17 11:15:54 |
Protection Against Cybercriminals Requires Vigilance (lien direct) |
Establishing protection against cybercriminals is a tall order for organizations, but it can begin with something as simple as paying attention. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-16 13:01:07 |
Hacktivism: Fearmongering or Real Threat? (lien direct) |
Organizations must be prepared for possible hacktivism campaigns by arming themselves with the best defensive tools and security strategies. |
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-05-16 10:15:55 |
Mobile Security Challenges: You\'re Not Alone (lien direct) |
A recent mobile security study from IBM revealed some of the challenges and benefits associated with moving to a mobile enterprise. |
|
|
|