Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2016-07-27 18:19:01 |
Dark Reading News Desk Coming Back To Black Hat, Live http://ubm.io/2axiVAQ (lien direct) |
Dark Reading News Desk Coming Back To Black Hat, Live http://ubm.io/2axiVAQ |
|
|
|
|
2016-07-27 18:02:46 |
(Déjà vu) Webinar TH at 1PM EDT: How to Use Threat Intel to Improve Security Ops w @RCISCwendy & @Anomali's Colby DeRodeff http://ubm.io/2a18ViV (lien direct) |
Webinar TH at 1PM EDT: How to Use Threat Intel to Improve Security Ops w & 's Colby DeRodeff http://ubm.io/2a18ViV |
|
|
|
|
2016-07-27 16:16:49 |
The Internet Of Tiny Things: What Lurks Inside http://ubm.io/2a9DHlQ (lien direct) |
The Internet Of Tiny Things: What Lurks Inside http://ubm.io/2a9DHlQ |
|
|
|
|
2016-07-27 16:16:49 |
Vixie's Farsight Rolls Out Its First Enterprise DNS Security Service http://ubm.io/2aqjHNv (lien direct) |
Vixie's Farsight Rolls Out Its First Enterprise DNS Security Service http://ubm.io/2aqjHNv |
|
|
|
|
2016-07-27 16:10:20 |
Kung fu malware by @psaneme can mimic the behavior of sandbox to prevent execution of malicious code #BHUSA Arsenal http://ow.ly/ewRQ302Dw7H (lien direct) |
Kung fu malware by can mimic the behavior of sandbox to prevent execution of malicious code Arsenal http://ow.ly/ewRQ302Dw7H |
|
|
|
|
2016-07-27 15:54:26 |
#AWS Cautionary Tales & How To Avoid Becoming One> @palerra #whitepaper offers tips to keep you protected http://ubm.io/2aeEynu (lien direct) |
Cautionary Tales & How To Avoid Becoming One> offers tips to keep you protected http://ubm.io/2aeEynu |
|
|
★★★★
|
|
2016-07-27 15:15:21 |
Implement Cyber Threat Intelligence systems in a virtual enterprise to identify & prioritize threats #BHUSA Training http://ow.ly/dHaQ302Dwre (lien direct) |
Implement Cyber Threat Intelligence systems in a virtual enterprise to identify & prioritize threats Training http://ow.ly/dHaQ302Dwre |
|
|
|
|
2016-07-27 14:17:50 |
We know there's a cybersecurity skills gap, but now some #s show what that really means risk-wise to organizations: http://ubm.io/2a9hggB (lien direct) |
We know there's a cybersecurity skills gap, but now some show what that really means risk-wise to organizations: http://ubm.io/2a9hggB |
|
|
|
|
2016-07-27 14:15:46 |
Kimpton Hotel Chain Investigating Possible Payment Card Breach http://ubm.io/2aK05Tn (lien direct) |
Kimpton Hotel Chain Investigating Possible Payment Card Breach http://ubm.io/2aK05Tn |
|
|
|
|
2016-07-27 14:15:46 |
Cybersecurity Skills Shortage Puts Organizations At Risk, Study Shows http://ubm.io/2avfkn9 (lien direct) |
Cybersecurity Skills Shortage Puts Organizations At Risk, Study Shows http://ubm.io/2avfkn9 |
|
|
|
|
2016-07-27 14:15:46 |
Russia Rejects DNC Breach Allegations As 'Old Trick' http://ubm.io/29Zp5Ju (lien direct) |
Russia Rejects DNC Breach Allegations As 'Old Trick' http://ubm.io/29Zp5Ju |
|
|
|
|
2016-07-26 23:34:37 |
(Déjà vu) RT @BlackHatEvents: A downloadable PDF of the #BHUSA schedule is now available – start planning for #BlackHat 2016 http://ow.ly/z65a302Du5r (lien direct) |
RT : A downloadable PDF of the schedule is now available – start planning for 2016 http://ow.ly/z65a302Du5r |
|
|
|
|
2016-07-26 23:32:28 |
(Déjà vu) RT @BlackHatEvents: #BHUSA Business Pass is a great option for anyone unable to commit to a 2-day Briefing schedule http://ow.ly/MVPS302DtVT (lien direct) |
RT : Business Pass is a great option for anyone unable to commit to a 2-day Briefing schedule http://ow.ly/MVPS302DtVT |
|
|
|
|
2016-07-26 23:18:34 |
Obama Issues Federal Government Policy For Cyberattack Response http://ubm.io/2avdOOH (lien direct) |
Obama Issues Federal Government Policy For Cyberattack Response http://ubm.io/2avdOOH |
|
|
|
|
2016-07-26 21:05:17 |
#BHUSA Trainings begin this Saturday, and #BlackHat Briefings begin Wednesday, August 3. Still time to register! http://ow.ly/lMPz302Bl2T (lien direct) |
Trainings begin this Saturday, and Briefings begin Wednesday, August 3. Still time to register! http://ow.ly/lMPz302Bl2T |
|
|
|
|
2016-07-26 18:05:23 |
The #BHUSA Business Pass is a great option for anyone unable to commit to a full 2-day Briefing schedule http://ow.ly/kX3Z302BkRm (lien direct) |
The Business Pass is a great option for anyone unable to commit to a full 2-day Briefing schedule http://ow.ly/kX3Z302BkRm |
|
|
|
|
2016-07-26 17:05:25 |
Discover "The Linux Kernel Hidden Inside Windows 10" in this #BHUSA 2016 Briefing from @aionescu http://ow.ly/wxpL302BkN8 (lien direct) |
Discover "The Linux Kernel Hidden Inside Windows 10" in this 2016 Briefing from http://ow.ly/wxpL302BkN8 |
|
|
|
|
2016-07-26 16:38:10 |
Complexities of the Secure DIY Cloud: @Armor #Whitepaper to help evaluate managed cloud environment options http://ubm.io/2auiEi5 (lien direct) |
Complexities of the Secure DIY Cloud: to help evaluate managed cloud environment options http://ubm.io/2auiEi5 |
|
|
|
|
2016-07-26 16:25:32 |
Safely Enabling #Office365: A Requirements Checklist: @netscope Whitepaper to help reduce #risk, enforce #compliance http://ubm.io/2a70mzX (lien direct) |
Safely Enabling : A Requirements Checklist: Whitepaper to help reduce , enforce http://ubm.io/2a70mzX |
|
|
|
|
2016-07-26 16:21:12 |
In Security, Know That You Know Nothing http://ubm.io/2askbWe (lien direct) |
In Security, Know That You Know Nothing http://ubm.io/2askbWe |
|
|
|
|
2016-07-26 16:21:05 |
Security Holes Exposed In Smart Lighting System http://ubm.io/2ae5Bg5 (lien direct) |
Security Holes Exposed In Smart Lighting System http://ubm.io/2ae5Bg5 |
|
|
|
|
2016-07-26 16:21:05 |
Russia Likely Behind DNC Breach, Says FBI http://ubm.io/2acaoRy (lien direct) |
Russia Likely Behind DNC Breach, Says FBI http://ubm.io/2acaoRy |
|
|
|
|
2016-07-26 16:21:05 |
Report Finds Healthcare Most Targeted By Ransomware http://ubm.io/2abdNgf (lien direct) |
Report Finds Healthcare Most Targeted By Ransomware http://ubm.io/2abdNgf |
|
|
|
|
2016-07-26 16:09:48 |
Maintaining Compliance for the Cloud Generation: @BlueCoat #Whitepaper analyzes over 63 million documents http://ubm.io/2aueKWB (lien direct) |
Maintaining Compliance for the Cloud Generation: analyzes over 63 million documents http://ubm.io/2aueKWB |
|
|
|
|
2016-07-26 15:17:34 |
'MouseJack' Researchers Uncover Major Wireless Keyboard Vulnerability http://ubm.io/2ac0oI1 (lien direct) |
'MouseJack' Researchers Uncover Major Wireless Keyboard Vulnerability http://ubm.io/2ac0oI1 |
|
|
|
|
2016-07-26 13:17:19 |
SentinelOne Offers $1 Million Guarantee To Stop Ransomware http://ubm.io/2arLKin (lien direct) |
SentinelOne Offers $1 Million Guarantee To Stop Ransomware http://ubm.io/2arLKin |
|
|
|
|
2016-07-25 22:16:26 |
New Portal Offers Decryption Tools For Some Ransomware Victims http://ubm.io/2artUZB (lien direct) |
New Portal Offers Decryption Tools For Some Ransomware Victims http://ubm.io/2artUZB |
|
|
|
|
2016-07-25 21:22:29 |
Data Breaches. Don't Blame Security Teams Blame Lack of Context @cybereason #whitepaper shows benefits of automation http://ubm.io/2a6JjSA (lien direct) |
Data Breaches. Don't Blame Security Teams Blame Lack of Context shows benefits of automation http://ubm.io/2a6JjSA |
|
|
|
|
2016-07-25 20:51:25 |
Case Study: Healthcare Company Finds Rx to Raise Its Security Posture with @ProtectWise http://ubm.io/2a9Hcuv #Cloud #networking (lien direct) |
Case Study: Healthcare Company Finds Rx to Raise Its Security Posture with http://ubm.io/2a9Hcuv |
|
|
|
|
2016-07-25 20:20:04 |
Why Are You Paying for Antivirus? @CarbonBlack_Inc Whitepaper tells why AV is powerless against advanced threats http://ubm.io/2asmZlH (lien direct) |
Why Are You Paying for Antivirus? Whitepaper tells why AV is powerless against advanced threats http://ubm.io/2asmZlH |
|
|
|
|
2016-07-25 20:13:06 |
New BYOD Best Practices from VMware @AirWatch > Learn how to empower IT with a future-proof mobility platform http://ubm.io/29VrXXL (lien direct) |
New BYOD Best Practices from VMware > Learn how to empower IT with a future-proof mobility platform http://ubm.io/29VrXXL |
|
|
|
|
2016-07-25 19:58:45 |
Cost of Unintentional Insider Threats> @Forcepointsec #Whitepaper offers tools to help any work environment http://ubm.io/2a6ySyC (lien direct) |
Cost of Unintentional Insider Threats> offers tools to help any work environment http://ubm.io/2a6ySyC |
|
|
|
|
2016-07-25 19:55:20 |
A downloadable PDF of the #BHUSA schedule is now available – start planning for #BlackHat 2016 in Las Vegas http://ow.ly/71KH302wuuV (lien direct) |
A downloadable PDF of the schedule is now available – start planning for 2016 in Las Vegas http://ow.ly/71KH302wuuV |
|
|
|
|
2016-07-25 19:21:42 |
10 Hottest Talks at Black Hat USA 2016 http://ubm.io/2a9smUR (lien direct) |
10 Hottest Talks at Black Hat USA 2016 http://ubm.io/2a9smUR |
|
|
|
|
2016-07-25 18:40:24 |
REMINDER: Guarantee a seat in the #BHUSA Training course of your choice is by registering in advance online http://ow.ly/6Q2j302wun6 (lien direct) |
REMINDER: Guarantee a seat in the Training course of your choice is by registering in advance online http://ow.ly/6Q2j302wun6 |
|
|
|
|
2016-07-25 17:10:32 |
(Déjà vu) The hardware design & boot process of the secure enclave processor & SEPOS by @kernelpool & @msolnik at #BHUSA http://ow.ly/bWP2302wupZ (lien direct) |
The hardware design & boot process of the secure enclave processor & SEPOS by & at http://ow.ly/bWP2302wupZ |
|
|
|
|
2016-07-25 16:05:22 |
Dan Kaminsky (@dakami) will present the #BHUSA 2016 Keynote on Wednesday, August 3 at 09:00 in Oceanside Ballroom http://ow.ly/CnmE302wu9Q (lien direct) |
Dan Kaminsky () will present the 2016 Keynote on Wednesday, August 3 at 09:00 in Oceanside Ballroom http://ow.ly/CnmE302wu9Q |
|
APT 32
|
|
|
2016-07-25 14:15:52 |
Three Arrested For Cell Phone Hacking Scam http://ubm.io/29Zk5QC (lien direct) |
Three Arrested For Cell Phone Hacking Scam http://ubm.io/29Zk5QC |
|
|
|
|
2016-07-25 14:15:52 |
Edward Snowden Designs Anti-Spying Smartphone Device http://ubm.io/29ZkCSp (lien direct) |
Edward Snowden Designs Anti-Spying Smartphone Device http://ubm.io/29ZkCSp |
|
|
|
|
2016-07-25 13:17:05 |
Building Black Hat: Locking Down One of the World's Biggest Security Conferences http://ubm.io/2aoiaKJ (lien direct) |
Building Black Hat: Locking Down One of the World's Biggest Security Conferences http://ubm.io/2aoiaKJ |
|
|
|
|
2016-07-22 22:17:42 |
5 Ways To Protect HR From Ransomware http://ubm.io/2amCI5O (lien direct) |
5 Ways To Protect HR From Ransomware http://ubm.io/2amCI5O |
|
|
|
|
2016-07-22 22:17:42 |
How Jihadists Operate Online And Under The Radar: Report http://ubm.io/2a6sJkd (lien direct) |
How Jihadists Operate Online And Under The Radar: Report http://ubm.io/2a6sJkd |
|
|
|
|
2016-07-22 21:30:39 |
Operational Model for Breach Analytics & Intelligence to manage threats & threat hunting> #whitepaper from @Anomali http://ubm.io/2a3AkMC (lien direct) |
Operational Model for Breach Analytics & Intelligence to manage threats & threat hunting> from http://ubm.io/2a3AkMC |
|
|
|
|
2016-07-22 21:20:36 |
Build Security Into Your Software Development Process: @cigital ebook tells how to improve efficiency & reduce costs http://ubm.io/29QTVDQ (lien direct) |
Build Security Into Your Software Development Process: ebook tells how to improve efficiency & reduce costs http://ubm.io/29QTVDQ |
|
|
|
|
2016-07-22 21:14:47 |
(Déjà vu) Must Read: How To Build An Effective Defense Against #Ransomware> Learn about Crowdsourcing The Dark Web & More http://ubm.io/29SNIUj (lien direct) |
Must Read: How To Build An Effective Defense Against > Learn about Crowdsourcing The Dark Web & More http://ubm.io/29SNIUj |
|
|
|
|
2016-07-22 19:20:24 |
7 Ways To Lock Down Your Privileged Accounts http://ubm.io/2a6lRCv (lien direct) |
7 Ways To Lock Down Your Privileged Accounts http://ubm.io/2a6lRCv |
|
|
|
|
2016-07-22 17:16:38 |
5 Failsafe Techniques For Interviewing Security Candidates http://ubm.io/29YPWSW (lien direct) |
5 Failsafe Techniques For Interviewing Security Candidates http://ubm.io/29YPWSW |
|
|
|
|
2016-07-22 16:19:30 |
Asia Mulls Europol-Style Agency To Fight Cybercrime http://ubm.io/2a1q4am (lien direct) |
Asia Mulls Europol-Style Agency To Fight Cybercrime http://ubm.io/2a1q4am |
|
|
|
|
2016-07-21 22:17:06 |
Auto Industry ISAC Releases Best Practices For Connected Vehicle Cybersecurity http://ubm.io/29QB88c (lien direct) |
Auto Industry ISAC Releases Best Practices For Connected Vehicle Cybersecurity http://ubm.io/29QB88c |
|
|
|
|
2016-07-21 20:25:17 |
(Déjà vu) Tech Digest: DNS Threats: What Every Enterprise Should Know> Learn How DNS Works & 4 Common Attacks & Mitigation http://ubm.io/29TEvyn (lien direct) |
Tech Digest: DNS Threats: What Every Enterprise Should Know> Learn How DNS Works & 4 Common Attacks & Mitigation http://ubm.io/29TEvyn |
|
|
★★★★★
|