Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2018-06-26 11:00:03 |
How to Deliver Frictionless Digital Trust With Pinpoint Accuracy (lien direct) |
>Companies that lack the resources to establish digital trust seamlessly, via a frictionless online experience, risk incurring high abandonment rates and low net promoter scores (NPS).
|
|
|
★★★★
|
|
2018-06-25 18:30:03 |
(Déjà vu) IBM Named a Leader Again in the 2018 Gartner Magic Quadrant for Access Management, Worldwide (lien direct) |
>For the second consecutive year, Gartner has named IBM a leader in its Magic Quadrant for Access Management, Worldwide report, validating its leadership in identity-as-a-service (IDaaS).
|
Guideline
|
|
|
|
2018-06-25 16:50:02 |
It\'s Time to Infuse AI Into Your Endpoint Security Strategy (lien direct) |
As the threat landscape evolves to target connected devices, artificial intelligence (AI) and machine learning will become increasingly crucial parts of any organization's endpoint security strategy.
|
Threat
|
|
|
|
2018-06-25 11:30:03 |
Why Network Visibility Is Critical for Today\'s Compliance Mandates (lien direct) |
Without network visibility, organizations run the risk of mishandling customers' personal data and running afoul of new compliance mandates.
|
|
|
|
|
2018-06-25 11:05:03 |
How to Prioritize Security Vulnerabilities in SecDevOps (lien direct) |
>What's the first step toward prioritizing security vulnerabilities? Know which open source components developers use in their code and monitor them for alerts using SAST tools.
|
|
|
|
|
2018-06-22 11:45:02 |
Why Security Skills Should Be Taught, Not Hired (lien direct) |
>To alleviate the cybersecurity hiring gap, CISOs should look to tap new pools of talent in adjacent industries and help new hires develop their security skills through thorough, regular training.
|
|
|
|
|
2018-06-21 11:50:02 |
Fight Fire With Fire: How AI Plays a Role in Both Stopping and Committing DDoS Attacks (lien direct) |
>When the machine learning technology cyber defenders use to stop DDoS attacks inevitably falls into the hands of malicious actors, which side will win?
|
|
|
|
|
2018-06-20 12:05:02 |
Why Privileged Access Management Is Key to Preventing Insider Threats (lien direct) |
>To protect their networks from insider threats, security teams need greater visibility into privileged accounts held by both employees and third-party vendors.
|
|
|
|
|
2018-06-20 11:15:02 |
How to Recognize a Business Email Compromise Attack (lien direct) |
>Security leaders must implement phishing awareness programs to train employees to recognize business email compromise (BEC) attacks and other social engineering schemes that could compromise data.
|
Guideline
|
|
★★★★★
|
|
2018-06-20 10:10:02 |
How Can Security Leaders Maintain Control of Privileged Accounts? (lien direct) |
>When users are granted inappropriate access to privileged accounts, they open the entire IT environment to vulnerabilities - and make it easier for malicious actors to infiltrate corporate networks.
|
|
|
|
|
2018-06-19 12:15:02 |
Why Community Is a Lifeline for Cybersecurity Experts (lien direct) |
>Think about your day-to-day job as one of the many cybersecurity experts working in the industry today: What are your challenges? Learn how a community could be your lifeline.
|
|
|
|
|
2018-06-19 11:25:02 |
Humans vs. Machines: Will Adversarial AI Become the Better Hacker? (lien direct) |
>The advent of artificial intelligence (AI) brought with it a new set of attacks using adversarial AI. How can organizations fight an unknown enemy that's not even human?
|
|
|
|
|
2018-06-19 11:10:02 |
How to Overcome Cognitive Biases That Threaten Data Security (lien direct) |
>No one is immune to cognitive biases, but how can IT decision-makers ensure that logical flaws don't weaken data security? Learn how to overcome these security flaws that exist in our heads.
|
|
|
|
|
2018-06-18 12:15:02 |
Is Corporate VPN Security Dead? (lien direct) |
>Corporate VPN security still plays a vital role in protecting enterprise networks, but it is no longer sufficient to prevent unauthorized third-party or privileged access on its own.
|
|
|
|
|
2018-06-18 10:30:02 |
How Cloud Security Can Drive Innovation and Transform Your Business (lien direct) |
>At the May 2018 IBM Security Summit in London, industry experts discussed how organizations could transform their business by developing a formal strategy for cloud security.
|
|
|
★★★★
|
|
2018-06-15 14:50:04 |
Is Your Healthcare Organization Prepared to Withstand a Data Security Breach? (lien direct) |
>The most effective way to protect against a data security breach is to develop an immune system around an AI-powered core of security orchestration and analytics tools.
|
|
|
|
|
2018-06-15 02:45:02 |
On the Hunt: Neutralize Malicious Actors With Proactive Threat Hunting (lien direct) |
>Threat hunting enables security teams to shift from simply responding to attacks to proactively identifying and mitigating threats before they hit enterprise networks.
|
|
|
|
|
2018-06-14 11:55:01 |
Can a Mature Bug Bounty Program Help Solve the Security Talent Shortage? (lien direct) |
>With a well-planned, mature bug bounty program, security leaders can lessen the impact of the security talent shortage by tapping the white-hat hacker community.
|
Guideline
|
|
|
|
2018-06-14 11:10:02 |
Enterprise Cloud Security: Is Blockchain Technology the Missing Link? (lien direct) |
>While blockchain technology holds promise for cloud security, it's not the singular missing link. To ensure data privacy, blockchain must be properly integrated with existing apps and services.
|
|
|
|
|
2018-06-13 12:27:04 |
Space Rogue: A Security Rebel Turned Pen Tester (lien direct) |
>Two decades ago, Cris Thomas testified before Congress about various cybersecurity issues he uncovered as a white hat hacker. Today, he works as a penetration testing specialist for IBM X-Force Red.
|
|
|
|
|
2018-06-13 11:57:02 |
A Proposed Solution to the Password Reuse Problem (lien direct) |
>A group of researchers proposed a new framework that would enable web services to share users' password hash data in an effort to reduce password reuse.
|
|
|
|
|
2018-06-13 11:17:03 |
Four Ways IDaaS Can Help You Overcome Cloud Identity Hurdles (lien direct) |
>An investment in IDaaS solutions can help organizations overcome common cloud identity challenges related to infrastructure support, specialized staffing, consistent deployments and maintenance.
|
|
|
|
|
2018-06-12 14:37:03 |
There\'s Never Been a Better Time to Consider Security Careers (lien direct) |
Many people are intimidated by the thought of security careers. Why? They incorrectly believe all security jobs require technical expertise, as well as extensive academic training and certifications.
|
|
|
|
|
2018-06-12 14:37:03 |
GDPR: Time to Move Forward - and Keep It Going (lien direct) |
>Now is the time for organizations to move forward with their GDPR readiness plans and ensure that compliance activities are embedded into their overall security strategy.
|
|
|
|
|
2018-06-12 12:12:03 |
Ransomware Recovery: Maintain Control of Your Data in the Face of an Attack (lien direct) |
>Organizations can significantly reduce the risk and cost of ransomware recovery by investing in cloud data protection tools that feature file and object store encryption capabilities.
|
|
|
|
|
2018-06-11 13:22:02 |
Application Security Attacks: Will New NYDFS Regulation Protect NYC Financial Institutions? (lien direct) |
>New regulation requires all financial institutions in New York City to conduct thorough risk assessments for application security and other IT issues and implement programs to address those risks.
|
|
|
|
|
2018-06-11 11:35:03 |
How Will You Face the High Price of DDoS Attacks? (lien direct) |
>The largest distributed denial-of-service (DDoS) attack that occurred in the spring of 2018 targeted GitHub and lasted more than eight minutes and measured 1.3 Tbps. How will you face such an attack?
|
|
|
|
|
2018-06-08 13:27:03 |
Jump-Start Your Management of Known Vulnerabilities (lien direct) |
>Known vulnerabilities are the weaknesses that are most often exploited, but how can they be managed?
|
|
|
|
|
2018-06-08 13:27:02 |
A Step-By-Step Guide to Vulnerability Assessment (lien direct) |
>Sometimes, security professionals don't know how to approach a vulnerability assessment, especially when it comes to dealing with results from its automated report. Here's how to get started.
|
|
|
|
|
2018-06-07 14:20:02 |
Musings From a Coffee Bar: Threat Modeling Tips for Open Campus Security (lien direct) |
>Chief information security officers (CISOs) shouldn't be afraid of an open campus. Threat modeling allows internal security teams to tailor security to areas that present the greatest security risk.
|
|
|
|
|
2018-06-06 13:18:00 |
Cybersecurity at the World Cup: What You Should Know (lien direct) |
>Global sporting events require heightened cybersecurity because of the expanded digitization of sports venues.
|
|
|
|
|
2018-06-06 13:18:00 |
Incident Response and Digital Forensics: Will You Buy or Build? (lien direct) |
>Companies generally have two options for incident response and digital forensics: Buy or build? Explore the fundamentals of both options, which could help you decide.
|
|
|
|
|
2018-06-05 13:02:03 |
Analyzing Your GDPR Readiness: The Core Data Protection Capabilities You Need (lien direct) |
>The sweeping General Data Protection Regulation (GDPR) from the European Union (EU) intends to revolutionize the relationships of data holders or processors and the people associated with that data.
|
|
|
★★★
|
|
2018-06-05 12:07:02 |
Open Source Tools for Active Defense Security (lien direct) |
>If your goal is active defense, open source options may be particularly useful because these tools can help you demonstrate value and shore up support.
|
|
|
|
|
2018-06-05 11:33:04 |
Enterprise Cloud Security With 2020 Vision (lien direct) |
>If you haven't already, you should consider a checkup on the health of your cloud security vision for 2020 and beyond.
|
|
|
|
|
2018-06-04 13:02:02 |
Narrowing the Gaps in Unified Endpoint Management (UEM) (lien direct) |
>Unified endpoint management (UEM) delivers on the promise of bringing a vast range of endpoints and enterprise use cases under one management console.
|
|
|
★★★★★
|
|
2018-06-04 12:02:02 |
Establishing Digital Identity Assurance: Who Is in Your Circle of Digital Trust? (lien direct) |
Companies must quickly and transparently establish digital trust across the omnichannel client journey.
|
|
|
|
|
2018-06-04 11:57:02 |
What Are the Different Types of Cyberthreat Intelligence? (lien direct) |
>Building a cyberthreat intelligence program can be a daunting task. However, it's best to start small and grow continuously.
|
|
|
|
|
2018-06-01 11:33:04 |
Discover What Happened After a Security Incident - Without Losing Your Cool (lien direct) |
>When a dreaded security incident or breach takes place, you'll face your true testing time. Here's how to discover what happened after a security incident - without losing your cool.
|
|
|
|
|
2018-06-01 11:02:03 |
May\'s Cybersecurity Recap: Welcome to the GDPR Compliance Show (lien direct) |
Meeting the European Union's GDPR compliance has been a source of continuing difficulty and discussion for businesses.
|
|
|
|
|
2018-05-31 14:07:02 |
Are Ransomware Attacks Rising or Falling? (lien direct) |
>There are conflicting reports over whether or not ransomware attacks are growing. Many organizations state that it's the most popular malware form, but is this true?
|
|
|
|
|
2018-05-31 13:57:02 |
GDPR Breach Notification: What Are the Requirements for Response? (lien direct) |
>Last month I took part in a GDPR Summit panel where I spoke on the topic of breach notification. This blog shares the discussion points resulting from the debate.
|
|
|
|
|
2018-05-30 13:40:00 |
The Hack React: Testing a SOC Director\'s Cybersecurity Incident Response (lien direct) |
When Lincoln Healthcare experiences a watering hole attack, security operations center (SOC) director Malcolm Gerhard is tasked with developing a swift cybersecurity incident response. Will he succeed?
|
|
|
|
|
2018-05-30 13:39:02 |
The Inadvertent Insider Threat: A CISO Confronts a Breach From Within (lien direct) |
>Human error, credential misuse and disgruntled employees aren't the most common threats security leaders have to face - but the complexities of these incidents make insider threats the stuff of CISO nightmares.
|
Guideline
|
|
|
|
2018-05-30 13:37:05 |
The Compliance Crisis: A Compliance Officer Faces an Outdated Risk Management Framework (lien direct) |
>Follow along with risk and compliance officer Frank Roth as he endeavors to fill in the gaps of an outdated (and incomplete) risk management framework in his new role at a utility company.
|
|
|
★★★★
|
|
2018-05-30 13:36:03 |
The Cloud Commotion: An IT Director\'s Road to Cloud Transformation (lien direct) |
Follow the decision-making process of IT director Shira Sutton as she endeavors to avoid security risks and unnecessary business continuity headaches on the journey to cloud transformation.
|
|
|
★★
|
|
2018-05-30 12:49:05 |
The Modernization Misstep: A CEO Takes on Digital Transformation (lien direct) |
>Step into the shoes of an insurance company CEO chasing digital transformation. Read on as she tries to avoid missteps in this story about modernization, risks, fraud and user experience.
|
|
|
★★★
|
|
2018-05-29 13:03:00 |
New Banking Trojan MnuBot Discovered by IBM X Force Research (lien direct) |
>IBM X-Force Research has uncovered a new Brazilian, Delphi-based malware active in the wild in a recent campaign dubbed MnuBot.
|
|
|
★★★★★
|
|
2018-05-29 11:22:02 |
The 4 Critical Elements of an Incident Response Plan (lien direct) |
>Many security analysts and consultant agree: It's time to get serious about incident response. Explore four critical elements of a solid plan.
|
|
|
|
|
2018-05-29 11:07:02 |
What Are the Legalities and Implications of \'Hacking Back\'? (lien direct) |
The concept of "hacking back" opens up a wide range of cyber defense tools to IT and security managers. Lawmakers are interested in new rules that allow for more flexibility with these activities.
|
|
|
|