Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2020-01-21 12:15:59 |
Spear Phishing Gets Us Nearly Every Time: Lessons From Europol\'s Report (lien direct) |
Just how susceptible are people to phishing and spear phishing? Recent reports show an increase in phishing activity and sophistication as well as greater negative impacts.
|
|
|
|
|
2020-01-21 11:00:25 |
New NetWire RAT Campaigns Use IMG Attachments to Deliver Malware Targeting Enterprise Users (lien direct) |
IBM X-Force researchers have discovered a new campaign targeting organizations with fake business emails that deliver NetWire remote-access Trojan (RAT) variants.
|
Malware
|
|
|
|
2020-01-20 11:30:22 |
The Charm of Security-Driven Data Lake Architecture (lien direct) |
To keep up with today's threats, organizations need a way to correlate and analyze data over a longer period of time. Security-driven data lake architecture might just be the answer.
|
|
|
|
|
2020-01-17 14:45:22 |
What Is AI and How Can It Improve an Organization\'s Security Posture? (lien direct) |
AI can be used to supplement the efforts of security analysts and significantly reduce the time it takes to investigate and remediate threats.
|
|
|
|
|
2020-01-17 14:40:30 |
Enter Dustman: New Wiper Takes After ZeroCleare, Likely Targets Organizations in Region (lien direct) |
To understand the similarities between ZeroCleare and Dustman, IBM X-Force researchers took a closer look at their code and the files being used in attacks.
|
|
|
|
|
2020-01-17 13:00:25 |
3 Steps to Find the Right Digital Transformation Strategy for You (lien direct) |
The most important part of any digital transformation strategy is figuring out what's right for your organization. Here is a three-step process that can serve as a basic road map to figure that out.
|
|
|
|
|
2020-01-16 12:00:21 |
How Do We Ensure the Security of What Comes After the 5G Revolution? (lien direct) |
2020 will see huge investments in 5G networks, but what will the next telecommunication revolution look like? And how do we ensure this system is safe and secure?
|
|
|
★★
|
|
2020-01-14 12:00:22 |
9 Reasons Why Cybersecurity Stress Is an Industry Epidemic (lien direct) |
Learn why a security career may carry above-average risks of occupational stress, and how CISOs should respond before cybersecurity stress threatens employee well-being or enterprise security risks.
|
|
|
|
|
2020-01-14 11:00:25 |
3 Lessons From the Incident Response Tabletops (lien direct) |
Here are three lessons I've learned about incident response from having run tabletop exercises within IBM and alongside our clients.
|
|
|
|
|
2020-01-10 11:30:20 |
Is Juice Jacking a Legitimate Threat or Nothing to Worry About? (lien direct) |
Juice jacking is either a rare or currently unpracticed attack that's brimming with potential for cybercriminals and spies.
|
Threat
|
|
|
|
2020-01-09 11:00:25 |
3 Multicloud Security Considerations for the Modern Enterprise (lien direct) |
Organizations that are moving to multiple hybrid clouds can boost their cloud security posture with a centralized method for tracking all the critical aspects of multicloud environments.
|
|
|
|
|
2020-01-08 11:30:22 |
How Digital Natives Are Shaping the Future of Data Privacy (lien direct) |
Our collective attitude toward sharing is changing as we learn more about how maintaining data privacy is both desirable and difficult.
|
|
|
|
|
2020-01-08 11:00:26 |
From Mega to Giga: Cross-Version Comparison of Top MegaCortex Modifications (lien direct) |
MegaCortex seems to be looking for ways to improve, and with each version upgrading the previous release's functions, our team took a closer look at some of the highlights.
|
|
|
|
|
2020-01-07 12:00:21 |
Looking Back on a Year of (Unexpected) Security Keynote Speeches (lien direct) |
As wide-ranging as the security keynote speeches I heard last year were, almost all had a similar message: We're overwhelmed by threats that, if left unanswered, could take down our institutions.
|
|
|
|
|
2020-01-07 11:00:21 |
Containers in the Cloud: False Assumptions and Security Challenges (lien direct) |
Strengthening container security in the cloud starts with addressing the misconception that containers automatically provide security for the applications inside them.
|
|
|
|
|
2020-01-02 11:00:20 |
What Is the Biggest Challenge Facing Endpoint Security? Hint: It\'s Not Malware (lien direct) |
Comprehensive UEM solutions centrally support capabilities for data collection, reporting and alarming, data analysis, and automated response that are the hallmark of responsible endpoint security.
|
Malware
|
|
|
|
2020-01-01 14:00:52 |
Make These Security New Year\'s Resolutions to Bolster Your Cybersecurity in 2020 (lien direct) |
2020 is here. Toss any bad habits and take on new goals this year by identifying critical outcomes, defining key metrics and implementing your security New Year's resolutions step-by-step.
|
|
|
|
|
2019-12-31 14:00:51 |
How to Identify, Prioritize and Remediate Your Biggest Security Vulnerabilities (lien direct) |
By prioritizing security vulnerabilities based on weaponization and asset value, you can address them in manageable workloads and remediate the most critical ones first.
|
|
|
|
|
2019-12-30 14:15:18 |
About That IoT Device You Received as a Holiday Gift… (lien direct) |
An IoT device can be extremely useful in your everyday life, but like all technologies, it still has flaws and can add to your risk profile.
|
|
|
|
|
2019-12-27 14:00:49 |
Looking Ahead to 2020 Cybersecurity Trends and a New Decade (lien direct) |
As we look ahead to 2020 cybersecurity trends and beyond, it's crucial to shed light on some things that may keep us up at night and discuss how to prepare for what's in store.
|
|
|
|
|
2019-12-26 12:00:20 |
Demystifying Security in an Open, Hybrid Multicloud Environment (lien direct) |
Among the avalanche of applications across enterprises and the complexity of the modern IT landscape, security needs to embrace the change by adapting to an open, hybrid multicloud environment.
|
|
|
|
|
2019-12-24 14:00:39 |
The Uncommon Becomes Ordinary: 4 Trends That Defined Data Breaches in 2019 (lien direct) |
Four trends defined data breaches in 2019: million-record breaches, pinpoint ransomware attacks, data left exposed on cloud servers and the struggle of cryptocurrencies to go mainstream.
|
Ransomware
|
|
|
|
2019-12-23 14:00:59 |
3 Workforce Strategies to Improve the State of Jobs in Cybersecurity (lien direct) |
(ISC)2's "Cybersecurity Workforce Study" offers a clear picture of just how many jobs in cybersecurity are unfilled and what strategies to employ to close the gap.
|
|
|
|
|
2019-12-23 12:00:20 |
Slowing Data Security Tool Sprawl in a Hybrid Multicloud World (lien direct) |
Having centralized visibility and control over the organization's data security and compliance posture helps security teams take a comprehensive approach to hybrid multicloud data protection.
|
Tool
|
|
|
|
2019-12-20 14:00:34 |
Your Security Strategy Should Scale and Evolve Alongside Your Business (lien direct) |
As your business grows, you will need to deal with increased complexity around human interactions and technology and scale your defense strategy to account for sophisticated attacks from adversaries.
|
|
|
|
|
2019-12-19 11:15:22 |
How Unified Policy Management Can Enable Business Flexibility, Productivity and Security (lien direct) |
Unified policy management that is integrated both horizontally and vertically can enable better flexibility, productivity and security benefits.
|
|
|
|
|
2019-12-18 14:00:36 |
6 Security Awareness Gifts for the Cybersecurity Unaware (lien direct) |
Better personal security in everyday life isn't something everyone considers - at least, not until something goes wrong. Here are six security awareness gifts for the cybersecurity unaware.
|
|
|
|
|
2019-12-18 11:45:20 |
Cloud Security in 2020 Starts With Protecting Data Wherever It Resides (lien direct) |
As organizations move to the cloud, security needs to be at the forefront of the discussion. IBM Security's Chris Collard weighs in on cloud security trends from 2019 and top priorities for 2020.
|
|
|
|
|
2019-12-17 14:00:45 |
IBM X-Force Security Predictions for 2020 (lien direct) |
Experts from IBM X-Force reflect on the past year and also share security predictions for 2020, including evolutions in ransomware, AI adoption and targets for cybercriminals.
|
|
|
|
|
2019-12-17 12:30:22 |
Hey CMOs, Your Security Team Is Your Secret Weapon (lien direct) |
There is an untapped ally in your business that can help you not only reduce customer churn, but also improve your brand image and delight your customers: your security team.
|
|
|
|
|
2019-12-16 14:00:33 |
15 Cybersecurity Conferences in 2020 You Won\'t Want to Miss (lien direct) |
Improve your ongoing education plan for next year by committing to attend some of the best cybersecurity conferences in 2020, including RSAC, BSides, THINK, Black Hat and more.
|
|
|
|
|
2019-12-16 11:00:37 |
TP-Link Archer Router Vulnerability Voids Admin Password, Can Allow Remote Takeover (lien direct) |
If exploited, this router vulnerability can allow a remote attacker to take control of the router's configuration without authentication, putting personal and business data at risk.
|
Vulnerability
|
|
|
|
2019-12-13 14:00:51 |
A Year (and Decade) in Review: Key Takeaways From 2019 Cybersecurity Trends (lien direct) |
As the year comes to a close, it's worth looking back at 2019 cybersecurity trends, tactics and takeaways and the 2010s as a whole to help define the next decade of cyberdefense.
|
|
|
|
|
2019-12-13 14:00:37 |
Connected Car Security Is a New Kind of Mobile Security Risk (lien direct) |
With so much pessimism surrounding the threat landscape in the automobile industry, it's encouraging to hear that manufacturers are embracing connected car security concepts more than ever before.
|
Threat
|
|
|
|
2019-12-13 12:30:22 |
A Well-Written Scope Document Can Save Your Security Project (lien direct) |
With a well-written scope document, your team can work through a creative process that helps everyone come to the same understanding, share their opinions, work out tensions and feel heard.
|
|
|
|
|
2019-12-12 12:00:21 |
Achieve Your Business Goals by Seamlessly Integrating Cyber Risk Management (lien direct) |
Cyber risk management ensures that risks are considered and mitigated to protect the organization without losing sight of primary goals or blocking any digital transformation and innovation projects.
|
|
|
|
|
2019-12-11 14:00:33 |
What Are the Risks of the IoT in Financial Services? (lien direct) |
The nature of financial business means that both the promise and the risks of the IoT in financial services are great.
|
|
|
|
|
2019-12-11 12:00:20 |
Staying Vigilant About Retail Security Does Not End on Black Friday (lien direct) |
As one of the most targeted industries, retailers should be taking measures to build a secure infrastructure ahead of the holidays and keep retail security evolving and maturing all year long.
|
|
|
|
|
2019-12-05 14:00:52 |
6 Tech Gifts for Adults That Are Secure by Design (lien direct) |
Not sure what to gift your loved ones this year? Here are six tech gifts for adults to help them stay secure in the new year.
|
|
|
|
|
2019-12-04 14:25:33 |
Save Time, Increase Efficiencies and Improve Security With a Modern SIEM (lien direct) |
SIEM solutions must evolve to keep up with the rapidly changing threat landscape, technological advancements and the growing attack surface.
|
Threat
|
|
|
|
2019-12-04 14:25:17 |
13 Retail Payment Security Tips for Safe 2019 Holiday Shopping (lien direct) |
The holiday shopping season brings a spike in payment security threats for both consumers and retailers. Here are 13 ways to protect your sensitive data against retail cybercrime this year.
|
|
|
|
|
2019-12-04 11:00:27 |
New Destructive Wiper ZeroCleare Targets Energy Sector in the Middle East (lien direct) |
According to IBM X-Force research, the ZeroCleare wiper was used to execute a destructive attack that affected organizations in the energy and industrial sectors in the Middle East.
|
|
|
|
|
2019-12-03 12:00:21 |
When Stalkerware Stalks the Enterprise (lien direct) |
Stalkerware is a real problem that can lead to individuals being tracked and stalked via software on their smartphones. It's also a growing and underappreciated threat to enterprises.
|
Threat
Guideline
|
|
|
|
2019-12-03 11:00:28 |
TrickBot Widens Infection Campaigns in Japan Ahead of Holiday Season (lien direct) |
The threat group operating the TrickBot Trojan has been modifying some of the malware's modules as they continue to deploy their attacks in the wild - most recently in Japan.
|
Threat
|
|
|
|
2019-12-02 18:45:23 |
Attain Embedded Cloud Security With a DevSecOps Approach (lien direct) |
A DevSecOps approach to cloud security can embed fast-paced, collaborative and iterative processes in cloud environments.
|
|
|
|
|
2019-11-27 11:00:32 |
The Role of Evil Downloaders in the Android Mobile Malware Kill Chain (lien direct) |
Malware on official mobile app stores is a growing concern for all users. Increasingly, malware developers are getting around sophisticated app store controls by using mobile malware downloaders.
|
Malware
|
|
|
|
2019-11-26 14:00:53 |
Layer Up With a Layered Approach to Email Security This Winter (lien direct) |
Email security remains a top priority in 2019 and into the new year. Your best bet to fend off phishing attacks is to layer up with dynamic, data-driven protection.
|
|
|
|
|
2019-11-26 11:00:24 |
5 Reasons You\'re Spending Too Much Time, Energy and Money on Endpoint Management (lien direct) |
Unified endpoint management simplifies administrator tasks, reduces the time it takes to detect and resolve issues, and substantially reduces operational costs.
|
|
|
|
|
2019-11-25 15:25:19 |
Vigilance Is Key to Mitigating Retail Cybersecurity Risk on Black Friday (lien direct) |
Retail cybersecurity risks hit peak levels on Black Friday. Here's what consumers and retailers need to watch for in 2019 and how to stay protected against threats.
|
|
|
|
|
2019-11-22 14:00:26 |
Read This Before Making Your Case to Attend That Cybersecurity Conference (lien direct) |
How can you make the case for the value of attending a cybersecurity conference? How can you then bring that value back to your organization?
|
|
|
|