Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2018-11-30 13:10:02 |
5 Tips for Uncovering Hidden Cyberthreats with DNS Analytics (lien direct) |
>By understanding the basics of DNS analytics, the common methods of attack and the tools available to security teams, you will be better prepared to protect your enterprise from hidden cyberthreats.
|
|
|
|
|
2018-11-30 12:55:01 |
How to Future-Proof Your Enterprise With Quantum-Safe Cryptography (lien direct) |
>Organizations that act now to upgrade to quantum-safe cryptography will be better positioned to reap the benefits of this emerging technology in the coming decades.
|
|
|
|
|
2018-11-30 12:30:02 |
Insights From European Customers on Cybersecurity and Security Awareness (lien direct) |
>Hot topics of conversation around European Cyber Security Month (ECSM) included the challenges and opportunities of cybersecurity, the blurred line between the good guys and bad actors, and more.
|
|
|
|
|
2018-11-29 13:30:03 |
5 Recommendations to Improve Retail Cybersecurity This Holiday Season (lien direct) |
>With extra web traffic and high order volumes coming in, the holiday shopping season can be a particularly perilous time for retail cybersecurity.
|
|
|
|
|
2018-11-29 12:05:01 |
How Daniel Gor Helps Protect the World - and His Grandparents - From Financial Fraud (lien direct) |
>If you've ever gotten a financial fraud alert from your bank, you can thank Daniel Gor for developing the automated processes by which fraud analysts monitor customers' behavioral patterns.
|
|
|
|
|
2018-11-28 13:15:02 |
Phish or Fox? A Penetration Testing Case Study From IBM X-Force Red (lien direct) |
>The IBM X-Force Red team recently ran into trouble on a black-box penetration testing assignment. Here's how the testers overcame the obstacles to ultimately establish a solid adversarial operation.
|
|
|
|
|
2018-11-28 13:10:02 |
Why Is the Retail Industry Still Lacking Security? (lien direct) |
>A recent survey found that the retail industry is among the least secure industries. What can retailers do to turn that around this holiday season?
|
|
|
|
|
2018-11-28 13:00:02 |
Is Your SOC Overwhelmed? Artificial Intelligence and MITRE ATT&CK Can Help Lighten the Load (lien direct) |
By adopting artificial intelligence solutions to help execute the MITRE ATT&CK framework, security teams can reduce dwell times, guide threat hunting endeavors and lighten the load of SOC analysts.
|
Threat
|
|
|
|
2018-11-27 17:30:01 |
How to Defend Against Malvertising Drive-By Attacks (lien direct) |
>Malvertising - malware delivered by internet advertisements - can infect your computer even if you don't click on it. But there are steps you can take to protect yourself now.
|
Malware
|
|
|
|
2018-11-27 13:00:02 |
Retail Security Hygiene: The Case for Seasonal Checkups (lien direct) |
>Retail companies should conduct security hygiene checkups as early as possible this holiday season to identify key threats across e-commerce systems, seasonal staffing policies and employee behaviors.
|
|
|
|
|
2018-11-26 12:35:02 |
We Need to Talk About NIST\'s Dropped Password Management Recommendations (lien direct) |
NIST has changed its long-standing recommendations for password management, favoring minimal user friction over complexity requirements and regular password updates.
|
|
|
|
|
2018-11-26 12:20:03 |
How to Prepare for the Coming 5G Security Threats (lien direct) |
>5G communications networks will empower a future that some are calling the "Fourth Industrial Revolution" - but security leaders must prepare for the coming 5G security threats.
|
Guideline
|
|
|
|
2018-11-22 12:15:02 |
How Cloud Security Architect Andi Hudson Nurtures Today\'s Youth to Protect Tomorrow\'s Data (lien direct) |
When he's not helping clients stay on top of cloud security, Andi Hudson is reaching out to schools to spread awareness about careers in technology and the importance of data privacy.
|
|
|
|
|
2018-11-21 14:00:02 |
The Forrester Wave: Unified Endpoint Management, Q4 2018 - New Acronyms, New Leaders and How Device Management Has Evolved (lien direct) |
>IBM was named a leader in the "2018 Forrester Wave: Unified Endpoint Management, Q4 2018" report, and MaaS360 earned recognition as the best current offering in the marketplace.
|
Guideline
|
|
|
|
2018-11-21 14:00:02 |
Cyber Monday 2018: 5 Best Practices to Protect Consumer Data (lien direct) |
>Cyber Monday 2018 is just around the corner, and customers and malicious actors alike are gearing up. Is your retail security ready to tackle e-commerce fraud and improve consumer data protection?
|
|
|
|
|
2018-11-21 12:50:02 |
Easy Does It! A Timely Look Into Fraud TTPs in the Brazilian Financial Cybercrime Landscape (lien direct) |
>In this first article of a two-part series, IBM X-Force exposes some of its research on the typical malware and tactics, techniques and procedures (TTPs) used in Brazilian financial cybercrime.
|
Malware
|
|
|
|
2018-11-20 14:45:01 |
Why You Should Act Now to Prevent Peer-to-Peer Payments Network Fraud (lien direct) |
>Financial institutions seeking a piece of the hot P2P payments market must act to prevent network fraud with a multilayered prevention approach that includes a robust fraud detection engine.
|
|
|
|
|
2018-11-19 14:00:02 |
Retail Cybersecurity Is Lagging in the Digital Transformation Race, and Attackers Are Taking Advantage (lien direct) |
>Retail cybersecurity requires a large-scale transition to cope with new threat vectors, close significant infrastructure gaps, and extend security protocols across new cloud and SaaS platforms.
|
Threat
|
|
|
|
2018-11-19 12:10:02 |
Soft Skills, Solid Benefits: Cybersecurity Staffing Shifts Gears to Bring in New Skill Sets (lien direct) |
>It's time to prioritize soft skills, re-evaluate recruitment practices and prepare for a future where the hard skills of AI-enhanced tools require a soft-side balance to drive cybersecurity success.
|
|
|
|
|
2018-11-16 15:10:02 |
How to Stay One Step Ahead of Phishing Websites - Literally (lien direct) |
>Ahead-of-threat detection enables security professionals and consumers to identify potential phishing websites faster than traditional browser protection apps can blacklist active cyberthreats.
|
|
|
|
|
2018-11-16 14:15:01 |
How to Choose the Right Artificial Intelligence Solution for Your Security Problems (lien direct) |
>If you're thinking about adopting artificial intelligence as an ally in your security operations center, the following questions and considerations can be helpful to guide your decision-making.
|
|
|
|
|
2018-11-16 13:00:01 |
Why the EU Is More Likely to Drive IT and Security Trends Than the US (lien direct) |
>EU companies are far ahead of their U.S. counterparts in terms of adopting IT and security trends, according to recent research.
|
|
|
|
|
2018-11-15 14:20:02 |
4 Tips to Make the Most of Your Security Budget (lien direct) |
>Getting an increase security budget approved is one thing; spending it effectively is another challenge altogether. Follow these tips to get the most value out of your SOC's funds.
|
|
|
|
|
2018-11-14 14:00:02 |
Why User Behavior Analytics Is an Application, Not a Cybersecurity Platform (lien direct) |
>User behavior analytics (UBA) is a good application, but it isn't a replacement for SIEM. UBA is more accurately described as a cybersecurity application that can be added on top of an SIEM tool.
|
|
|
|
|
2018-11-14 12:05:01 |
How Can Industry Leaders and Academia Help Improve Cybersecurity Education? (lien direct) |
>It's up to security and educational leaders alike to improve and expand opportunities for cybersecurity education.
|
Guideline
|
|
|
|
2018-11-13 14:00:02 |
As Mobile Security Challenges Mount, How Can CIOs and CISOs Eliminate Blind Spots? (lien direct) |
>With modern mobile security challenges demanding a deeper level of visibility, policy and protection, organizations must invest in advanced unified endpoint management (UEM) solutions.
|
|
|
|
|
2018-11-13 12:00:02 |
How to Stop Mobile Apps That Steal (lien direct) |
>One of the best ways for cybercriminals to deliver a payload on your organization's network is to smuggle it inside your employees' mobile apps.
|
|
|
|
|
2018-11-12 17:00:02 |
Busting Cybersecurity Silos (lien direct) |
>To break down cybersecurity silos, professionals must work together to share security information and build collaborative solutions to address the evolving cybersecurity threat landscape.
|
Threat
|
|
|
|
2018-11-12 13:00:02 |
Trusting Security Metrics: How Well Do We Know What We Think We Know? (lien direct) |
>When it comes to security metrics, greater accuracy yeilds greater value, but complete context requires a diversity of insights. What if you can't have both?
|
|
|
|
|
2018-11-09 12:55:01 |
How Emerging Technologies Can Unexpectedly Advance - Or Impede - Cybersecurity Gender Inclusion (lien direct) |
>It's up to all of us to implement the waves of emerging security technologies and processes in ways that encourage, not impede, greater gender inclusion.
|
|
|
|
|
2018-11-09 12:50:02 |
How Can Companies Move the Needle on Enterprise Cloud Security Risks and Compliance? (lien direct) |
>Traditional vulnerability assessments don't always show the full picture of cloud security, compliance and risk. How can enterprises get ahead of the curve?
|
Vulnerability
|
|
|
|
2018-11-09 12:40:01 |
Why You Should Start Leveraging Network Flow Data Before the Next Big Breach (lien direct) |
>One of the most crucial types of information for threat detection and incident response is network flow data, which has several unique properties that can help security analysts uncover attacks.
|
Threat
|
|
|
|
2018-11-08 12:40:02 |
Top 5 Reasons to Attend the IBM Security Sessions at Think 2019 (lien direct) |
>As you consider the various IT security events happening next year, here are five key reasons why you should attend some of the compelling IBM Security sessions planned at Think 2019.
|
|
|
|
|
2018-11-08 11:00:03 |
Digital Identity Trust: A New Way to Authenticate (lien direct) |
>When building digital identity trust, security teams have historically struggled to find a balance between security and customer convenience. But what if they could have both?
|
|
|
|
|
2018-11-07 14:00:02 |
How Business Continuity Management Boosts Value in Your Security Program (lien direct) |
>A proactive, integrated business continuity management process will significantly boost the efficiency and value of your overall security program, according to the "2018 Cost of Data Breach Study."
|
Data Breach
|
|
|
|
2018-11-07 12:10:02 |
How to Reduce Hidden Endpoint Management Costs and Increase Efficiency (lien direct) |
>To reduce hidden endpoint management costs, look for solutions that give you comprehensive visibility into your endpoint landscape and enable you to consolidate tools and increase efficiency.
|
|
|
|
|
2018-11-06 14:00:03 |
A Fun and Educational Answer to the Security Awareness Problem: The Security Escape Room (lien direct) |
>A security escape room can be a fun and interactive way to train employees on various security concepts they might otherwise ignore.
|
|
|
|
|
2018-11-05 13:05:02 |
How to Use Passive DNS to Inform Your Incident Response (lien direct) |
>Passive DNS replication can be an essential source of data to contextualize your threat intelligence and inform your incident response plan.
|
Threat
|
|
|
|
2018-11-05 13:05:02 |
3 Creative Strategies to Narrow the Skills Gap (lien direct) |
>The cybersecurity skills gap will continue to grow until executive leadership takes more creative steps to narrow it.
|
Guideline
|
|
|
|
2018-11-02 15:25:01 |
How an IoT Botnet Could Breach the Power Grid and Cause Widespread Blackouts (lien direct) |
>A group of researchers from Princeton revealed that, through an attack dubbed MadIoT, threat actors could leverage an IoT botnet to compromise the power grid and cause widespread blackouts.
|
Threat
|
|
|
|
2018-11-02 12:45:01 |
Why You Should Seek Out Alternative Intelligence in Your Cybersecurity Recruitment (lien direct) |
>With constantly evolving threats and a growing skills gap, the cybersecurity industry should consider alternative intelligence to enable the full digital transformation of our organizations.
|
|
|
|
|
2018-11-02 12:40:03 |
How to Boost Your Data Privacy With a Virtual Private Network (lien direct) |
>Using a virtual private network (VPN) to obfuscate your location and encrypt data is a powerful way to boost data privacy and prevent the tracking, stalking and theft of personal information.
|
|
|
|
|
2018-11-01 12:15:02 |
How Dimitry Snezhkov Balances the Yin and Yang of Penetration Testing (lien direct) |
>Dimitry Snezhkov didn't touch a computer until he was 18. Now he spends his days penetration testing to uncover security gaps and his nights meditating on the balance of life.
|
|
|
|
|
2018-11-01 11:55:01 |
4 Hard-Learned Lessons for CISOs (lien direct) |
>Learn these lessons for CISOs before they hitch your security strategy.
|
|
|
|
|
2018-10-31 12:50:01 |
Major Application Security Oversights You Can\'t Afford (lien direct) |
Many IT teams have developed a habit of treating application security as an afterthought. As a result, it might be their greatest vulnerability.
|
|
|
|
|
2018-10-31 11:30:01 |
How to Develop an Immersive Cybersecurity Simulation (lien direct) |
>A well-planned cybersecurity simulation can help the entire organization, from incident responders to top leadership, practice their crisis management skills in a low-stakes yet immersive environment.
|
Guideline
|
|
|
|
2018-10-31 10:55:01 |
How Much Is Endpoint Management Really Costing You? (lien direct) |
>Many organizations are paying much more than they realize for endpoint management in terms of money, resources and speed. Where do these hidden costs come from, and how can companies reduce them?
|
|
|
|
|
2018-10-30 12:25:01 |
How SEO Poisoning Campaigns Are Mounting a Comeback (lien direct) |
>SEO poisoning is on the rise again. How do threat actors use search engine results to drive victims to malicious sites, and what can users do to protect themselves?
|
Threat
|
|
|
|
2018-10-30 11:45:01 |
Artificial Intelligence, Real Concerns: Hype, Hope and the Hard Truth About AI (lien direct) |
>With a corporate culture that supports transparency and human agency, it's possible to maximize the existing benefits of artificial intelligence (AI) while laying the groundwork for the future of AI.
|
|
|
|
|
2018-10-29 12:30:00 |
Data Risk Management: Circling the Wagons With Three Chief Officers Leading the Way (lien direct) |
>To establish a consolidated data risk management program, the chief information security officer (CISO), chief data officer (CDO) and chief risk officer (CRO) must be on the same page.
|
|
|
|