Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2018-05-25 11:42:02 |
What Are the Consequences of Neglecting User Security Training? (lien direct) |
>Are your user security training efforts working? You may have never paused to think about the relationship your users have with your security program.
|
|
|
|
|
2018-05-24 12:57:02 |
Lessons From the Cold War: Data Security Through Obscurity (lien direct) |
>What can the Cold War teach us about data security? More than you may realize. Explore alternative methods for securing transmitting data.
|
|
|
|
|
2018-05-24 11:12:02 |
Mixed Reality Meets Its Full Potential (lien direct) |
>Recent advancements have paved the way for the creation of a new, hybrid technology: mixed reality (MR). Developers are exploring how MR can add value to a variety of industries.
|
|
|
★★★
|
|
2018-05-23 13:22:02 |
Insider Threat Controls: What Are the GDPR Implications? (lien direct) |
>To remain General Data Protection Regulation (GDPR) compliant, you will need to make sure the right people have the right access. Explore the implications of GDPR on insider threat controls.
|
|
|
|
|
2018-05-23 12:02:02 |
IBM Named a Leader in the 2018 Gartner Magic Quadrant for Managed Security Services (lien direct) |
>Last year was another significant and transformational period for IBM Security, as it was named a leader in the 2018 Gartner Magic Quadrant for Managed Security Services for the fifth year in a row.
|
Guideline
|
|
★★
|
|
2018-05-22 14:57:01 |
Addressing the Massive Cybersecurity Skills Gap: Where Do We Begin? (lien direct) |
>According to a recent report, there are an estimated 350,000 open cybersecurity jobs in the U.S. What are our options for addressing this massive gap?
|
|
|
★★★★★
|
|
2018-05-22 08:32:01 |
Will Two-Factor Authentication Ever Get Its Time in the Sun? (lien direct) |
>Is two-factor authentification (2FA) already a thing of the past - or does it have a future? Explore some of the problems facing 2FA.
|
|
|
|
|
2018-05-22 08:22:02 |
Critical Data: How Exposed Is Your Personal Information? (lien direct) |
>Do you know who can see the critical data on your network? Learn how and why organizations may not be doing enough to protect sensitive information.
|
|
|
|
|
2018-05-21 13:07:05 |
Spotlight Your Data Within Shadow IT (lien direct) |
>A managed cloud access security broker (CASB) can help organizations gain visibility into shadow IT by monitoring all data transferred between the cloud and on-premises infrastructure.
|
|
|
|
|
2018-05-21 11:32:01 |
4 Social Engineering Tricks That Fool Unsuspecting Employees (lien direct) |
>Explore some of the most common social engineering tricks used to fool employees into handing over access to sensitive data. These include phishing, tailgating and social media pretexting.
|
|
|
|
|
2018-05-21 11:02:02 |
How to Transform Data Into Actionable Threat Intelligence (lien direct) |
>Threat intelligence should be translated into business-speak to help decision-makers understand the impact of potential threats and incorporate TI into their business strategies.
|
|
|
|
|
2018-05-18 10:02:01 |
Ready to Try Threat Modeling? Avoid These 4 Common Missteps (lien direct) |
>Avoid these common threat-modeling missteps. Threat modeling can help you identify and prioritize the risks to your organization - but if done incorrectly, it can leave you defenseless.
|
|
|
|
|
2018-05-17 14:52:01 |
Achieving More Effective Security With Collaborative Defense in Depth (lien direct) |
>Collaborative defense connects an organization's people, processes and technology to deliver improved security through open integrations, threat intelligence sharing and digital transformation.
|
|
|
|
|
2018-05-17 13:27:00 |
What Does PwC\'s Annual Corporate Directors Survey Tell Us About Cyber Risks? (lien direct) |
What can PwC's 2017 Annual Corporate Directors Survey tell us about cyber risks? Explore the key takeaways, including insights about strategy oversight and board oversight of IT and security.
|
|
|
★★★
|
|
2018-05-16 17:02:01 |
Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 2 (lien direct) |
>With so much data being moved to the cloud, it's more crucial than ever for companies to deploy advanced firewalls, anomaly detection and other defense mechanisms to mitigate the risk of DDoS attacks.
|
|
|
|
|
2018-05-16 11:42:01 |
Achieving GDPR Compliance: The Spark That Will Light a Fire of Change (lien direct) |
>A recent survey conducted by IBM Security and the IBM Institute for Business Value found that many organizations around the world are embracing GDPR compliance as an opportunity for innovation.
|
|
|
|
|
2018-05-16 11:17:01 |
Achieving Cloud Security Through Gray Skies (lien direct) |
>When it comes to cloud security challenges, the issue is one of complexity. Many organizations lack a centralized view of all workloads across all of their environments.
|
|
|
|
|
2018-05-15 13:52:02 |
4 Essentials for Effective Security Awareness Training (lien direct) |
>Awareness experts weigh in about the essential elements for an awareness program that keeps users engaged - and helps them identify major threats to an organization's security posture.
|
|
|
|
|
2018-05-15 12:07:01 |
Best Practices for Designing a Security Operations Center (lien direct) |
>Designing a security operations center (SOC) is not as simple as setting and forgetting an SIEM solution. Security leaders must consider human factors, business needs, budgetary constraints and more.
|
Guideline
|
|
|
|
2018-05-15 09:22:01 |
What Is Next-Generation Privileged Account Management? (lien direct) |
>Organizations need a privileged account management (PAM) solution that integrates seamlessly with the existing security environment - and helps security teams enforce least privilege policies.
|
|
|
|
|
2018-05-14 15:57:00 |
Threat Intelligence Machine Learning Adoption: Time to Ditch the Black Box Security Analytics (lien direct) |
>While studies reveal the majority of CTI adopters are dissatisfied with threat intelligence machine learning adoption, there's evidence the adversary is already using algorithms to their advantage.
|
|
|
|
|
2018-05-14 11:52:01 |
The Cherry on Top: Add Value to Existing Risk Management Activities With Open Source Tools (lien direct) |
>Organizations with established risk management processes can drive efficiency and improve their overall risk posture by leveraging open source tools.
|
|
|
|
|
2018-05-14 11:27:00 |
Playing It Smart for Data Controllers and Processors (lien direct) |
>Organizations preparing for GDPR should reach out to their third-party vendors to clearly define the roles, expectations and responsibilities of data controllers and processors.
|
|
|
|
|
2018-05-11 13:17:00 |
Breaking Bad Behavior: Can AI Combat Insider Threats? (lien direct) |
>Artificial intelligence (AI) tools enable security teams to identify behavioral patterns that could point to insider threats more quickly.
|
|
|
★★
|
|
2018-05-11 13:07:00 |
Connect the Dots: IoT Security Risks in an Increasingly Connected World (lien direct) |
>Although connected devices make our daily lives easier, IoT data, if not properly secured, can cause serious financial and reputational damage to companies deploying and manufacturing this technology.
|
|
|
★★★★★
|
|
2018-05-10 11:52:01 |
What Matters Most During a Data Breach? How You React (lien direct) |
>With the GDPR coming into effect on May 25, the cost of a data breach is about to skyrocket. A comprehensive, regularly updated CSIRP can help IR teams contain the damage associated with a breach.
|
|
|
|
|
2018-05-10 11:27:00 |
Cut Through the Fog: Improve Cloud Visibility to Identify Shadow IT (lien direct) |
>Security teams need a single, scalable cloud solution that integrates seamlessly with a SIEM platform to identify shadow IT - and cut through the fog of cloud security.
|
|
|
|
|
2018-05-09 17:07:00 |
What Is the Current State of Cyber Resilience? (lien direct) |
>Although new research revealed that the state of cyber resilience is improving - especially regarding executive engagement - there is still room for improvement.
|
|
|
|
|
2018-05-09 12:22:01 |
Risk Acceptance 101: What Happens When Security Needs Go Unfunded? (lien direct) |
>The refusal of top leadership to fund security initiatives often translates to explicit, willful risk acceptance.
|
Guideline
|
|
★★★★★
|
|
2018-05-09 11:12:00 |
A Whole New Ballgame: Applying the Immune System Approach to Sporting Event Cybersecurity (lien direct) |
Emerging mobile and cloud-based technologies present many new challenges pertaining to sporting event cybersecurity.
|
|
|
★★★
|
|
2018-05-08 14:00:04 |
WHOIS Behind Cyberattacks? Under GDPR, We May Not Know (lien direct) |
>GDPR's implementation on an issue relevant to the cybersecurity industry may well have negative consequences that (ironically) run contrary to its original intent.
|
|
|
★★★
|
|
2018-05-08 10:10:02 |
Mobile Financial Transactions Are Faster, But Are They Any Safer? (lien direct) |
>The mobile revolution has made it simpler and faster for banking customers to conduct financial transactions, but it has also expanded the attack surface for fraudsters aiming to steal sensitive data.
|
|
|
★★
|
|
2018-05-08 09:15:04 |
Reflecting on the Memcached Reflection Attacks: A Wake-Up Call for Developers (lien direct) |
>The memcached vulnerability isn't new, but attackers exploited it in late February to launch what might be the largest DDoS attack on record.
|
|
|
★★★★
|
|
2018-05-07 12:01:03 |
Why Collaborative Defense Is the Future of Endpoint Management (lien direct) |
>To improve endpoint management in today's threat landscape, IT organizations must embrace collaborative defense by integrating tools into a cohesive security ecosystem and sharing threat intelligence.
|
|
|
|
|
2018-05-07 10:41:01 |
If Video Killed the Radio, Will Malvertising Kill Your Website? (lien direct) |
>Malvertising isn't just a nuisance for internet users - it puts businesses and their customers at risk and compromises the integrity of the online advertising ecosystem.
|
|
|
|
|
2018-05-04 17:25:03 |
Data Privacy Regulations: Ensuring Mobile Data Protection in Light of Increasing Regulations (lien direct) |
>Organizations in every industry, from banking to retail, healthcare and more, are required to apply mobile data protection rules set by governments that impose massive fines in cases of noncompliance. Until the early 2000s, it was simpler to control data flows because information was mostly accessed from computers. Since then, companies have digitized their frameworks […]
|
|
|
|
|
2018-05-04 17:20:03 |
Class Is in Session: Improving Cybersecurity Awareness in the Education Sector (lien direct) |
>The education industry faces a security crisis, one that goes beyond protecting the classrooms and hallways. IT professionals in the education sector see cybersecurity as their top priority, consistently ranking it as their No. 1 concern. However, more than three-quarters of employees in the education field lack the cybersecurity awareness required to handle common privacy […]
|
|
|
|
|
2018-05-04 17:13:01 |
WannaCry Dominates Ransomware News in 2017, Drives 415 Percent Attack Boost (lien direct) |
>WannaCry drove a 415 percent increase in ransomware attacks and accounted for 90 percent of all detection reports in 2017. In addition to these eye-popping numbers, F-Secure’s “The Changing State of Ransomware” report also offered some positive ransomware news: The lack of big paydays for campaigns such as WannaCry and NotPetya are now causing a […]
|
|
NotPetya
Wannacry
|
|
|
2018-05-03 18:43:00 |
Debate Club: Comparing the Merits of Enterprise Mobility Management and Client Management Tools (lien direct) |
>For IT and security leaders, the ability to manage devices, apps and content are critical to end-user productivity and the protection of corporate information. There are two popular methods for doing this across smartphones, tablets, laptops and servers. For mobile devices, the technology is most commonly referred to as enterprise mobility management (EMM). For laptops, […]
|
Guideline
|
|
|
|
2018-05-02 12:17:00 |
Why You Need New Mobile Security Best Practices for Business Travel (lien direct) |
>In recent years, the risks associated with passing through an airport have changed dramatically. This demands a complete rethink about mobile security best practices for international travel.
|
|
|
|
|
2018-05-02 11:42:00 |
April\'s Cybersecurity Recap: More AI, More IoT and a Push for More Privacy (lien direct) |
April's cybersecurity recap features more enterprises embracing AI and new insights into consumer perspectives on security.
|
|
|
|
|
2018-05-01 12:51:05 |
Analyzing PDF and Office Documents Delivered Via Malspam (lien direct) |
>Endpoint detection and antiphishing tools can help users filter basic spam email, but detecting malspam in PDF and Microsoft Office documents requires a more thorough investigation.
|
|
|
|
|
2018-05-01 11:32:00 |
Epic Fails in Data Security, Solutions Edition: Not Quantifying Your ROI (lien direct) |
>One of the most common epic fails in data security is the failure to quantify the ROI of the enterprise's data protection solutions.
|
|
|
|
|
2018-05-01 11:11:05 |
Simpler, Smarter Security With Intelligent Orchestration (lien direct) |
>IBM's new Intelligent Orchestration offering enables analysts to streamline their investigations via integrations and incident response playbooks.
|
|
|
|
|
2018-04-30 11:46:05 |
When It Comes to Cyber Risks, Your Leadership Cannot Afford a Failure of Imagination (lien direct) |
>A failure of imagination could cause business leaders fail to account for predictable cyber risks due to a misperception of the company's incident response capabilities and cyber resilience posture.
|
Guideline
|
|
|
|
2018-04-30 11:06:05 |
How to Build a Corporate Culture of Cyber Awareness (lien direct) |
>The key to creating a culture of cyber awareness is to start small, set achievable goals and help employees understand how enterprise security affects their own privacy.
|
|
|
|
|
2018-04-27 12:01:05 |
What Is the Way Ahead for Derivatives Clearing and Prime Services? (lien direct) |
>Derivatives clearing and prime services providers face many new challenges, including intensifying regulatory requirements and legacy systems that can't keep up with evolving business models.
|
|
|
|
|
2018-04-27 11:16:05 |
Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 1 (lien direct) |
>Cybercriminals use DoS and DDoS attacks to distrupt services and take down networks and applications by sending overwhelming volumes of malicious traffic to target systems.
|
|
|
|
|
2018-04-26 13:36:05 |
Insights From RSAC 2018: Taking the Human Element Out of Security (lien direct) |
>At RSAC 2018, many speakers urged organizations to take the human element out of the security equation as much as possible by investing in automated tools and focusing on professional development.
|
|
|
|
|
2018-04-26 11:46:05 |
Is End-to-End IoT Security Financially Feasible - or Even Possible? (lien direct) |
>Organizations can build toward end-to-end IoT security by understanding the risks connected devices pose to their networks and analyzing how they interact with corporate data.
|
|
|
|