Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2018-01-29 05:00:35 |
IBM Study: Consumers Weigh in on Biometrics, Authentication and the Future of Identity (lien direct) |
IBM Security's "Future of Identity Study" found that many consumers, especially millennials, are moving beyond passwords and using features such as biometric authentication to secure their identities.
|
|
|
|
|
2018-01-26 15:58:30 |
Is Your CISO a Jedi Warrior, an Admiral or a Diplomat? (lien direct) |
Take a look at some traits from the famous "Star Wars" characters we've grown to love and explore how those might be applicable to CISOs today.
|
|
|
|
|
2018-01-26 15:31:41 |
Choosing the Right Security Framework to Fit Your Business (lien direct) |
By adopting a hybrid security framework, organizations can cherry-pick the guidelines and compliance requirements that meet their unique business objectives.
|
|
|
|
|
2018-01-22 12:50:20 |
Data Risk Management, Part 2: Who Is Ultimately Accountable When a Big Breach Happens? (lien direct) |
By proactively determining who is responsible for data risk management before a data breach occurs, C-suite executives can help avoid such incidents in the first place.
|
|
|
|
|
2018-01-22 12:30:19 |
Building the Best Incident Response Team (lien direct) |
Building the right incident response team means looping in people outside of the IT and security teams.
|
|
|
|
|
2018-01-22 08:35:24 |
SecOps 2018: Cognitive Era and the Coming of GDPR (lien direct) |
As organizations prepare for GDPR in 2018, SecOps and cognitive technology will play crucial roles in helping to ensure improved security without compromising agility.
|
|
|
|
|
2018-01-19 12:50:17 |
No Degree, No Problem: Preparing Students for New Collar Jobs Through Alternative Education (lien direct) |
Many organizations across multiple sectors are creating new collar job opportunities to embrace the skills of aspiring professionals who lack traditional four-year college degrees.
|
|
|
|
|
2018-01-17 12:45:20 |
Secure and Seamless? Building Great Consumer Experiences With Silent IAM (lien direct) |
With silent IAM solutions, LOB executives and security professionals can verify and protect user identities without hindering the customer experience.
|
|
|
|
|
2018-01-17 12:42:21 |
The Risk Modeling Gotcha: Roles Are Like Hammers to Screws (lien direct) |
Roles are meant to drive efficiencies in provisioning, user management and recertifications, but many organizations still use them in risk modeling, impeding maturity and productivity.
|
|
|
|
|
2018-01-17 12:00:22 |
Increasing Security Preparedness and Awareness Among Board Members and Top Management (lien direct) |
To increase security preparedness and awareness among executives, CISOs need to communicate cyber risks in business terms and regularly assess their systems for vulnerabilities.
|
|
|
|
|
2018-01-16 10:50:25 |
Elevating Education on the Security and Resiliency Campus at Think 2018 (lien direct) |
Think 2018 offers attendees a unique opportunity to interact with IBM and industry experts, view hands-on demos and tackle today's top security issues.
|
|
|
|
|
2018-01-16 10:05:15 |
Meeting Identity and Access Management Challenges in the Era of Mobile and Cloud (lien direct) |
In our increasingly connected world, identity and access management is more crucial than ever for organizations seeking to empower their workforce with mobile and cloud technologies.
|
|
|
|
|
2018-01-16 10:00:16 |
Change Doesn\'t Happen All at Once: Navigating the GDPR Transformation Process (lien direct) |
After you've completed the Assess and Design phases of GDPR readiness, the next step is to implement and execute policies, processes and technologies to enhance your data privacy capabilities.
|
|
|
|
|
2018-01-12 13:30:28 |
Don\'t Leave Your Keys in the Ignition - Safeguard High-Value Data With Privileged Access Management (lien direct) |
For cybercriminals, failing to protect privileged credentials is like leaving the keys in your ignition. Implementing privileged access management is a crucial step toward minimizing cyber risks.
|
|
|
|
|
2018-01-12 12:50:15 |
The High ROI of Cyberweapons: Five Factors Driving the Rise in Threats (lien direct) |
Due to their low barrier to entry, increasing availability and high return on investment, cyberweapons are becoming massively popular among threat actors.
|
|
|
|
|
2018-01-11 14:40:54 |
Identifying Named Pipe Impersonation and Other Malicious Privilege Escalation Techniques (lien direct) |
Security analysts can nip many cyberattacks in the bud by monitoring for named pipe impersonation and other activity indicative of privilege escalation.
|
|
|
|
|
2018-01-11 14:20:52 |
Four Key Lessons From NACD\'s \'2018 Governance Outlook\' About Managing Cyber Risks (lien direct) |
The National Association of Corporate Directors (NACD)'s "2018 Governance Outlook: Projections on Emerging Board Matters" offered key advice to help board directors engage with cyber risk management.
|
|
|
|
|
2018-01-10 14:45:35 |
Don\'t Get Scared - Get Back in Operation With the Right Incident Response Strategy (lien direct) |
For incident response teams, resuming normal operations in the wake of a cyberattack is the name of the game. However, lack of preparation and poor communication can impede recovery efforts.
|
|
|
|
|
2018-01-10 14:20:46 |
Multistep Authentication Is No Longer Enough for PCI Compliance (lien direct) |
To meet PCI compliance, organizations must implement multifactor authentication, as opposed to a multistep process, to protect the cardholder data environment from unauthorized access.
|
|
|
|
|
2018-01-09 18:05:14 |
Five Epic Fails in Data Security: Do You Know How to Avoid Them? (lien direct) |
By avoiding these common data security failures, organizations can protect their valuable assets from increasingly sophisticated cybercriminals and steer clear of the next major data breach.
|
|
|
|
|
2018-01-09 15:25:14 |
Where the CISO Should Sit on the Security Org Chart and Why It Matters (lien direct) |
The CISO's position on the security org chart influences the nature and frequency of interactions the security leader will have other executives - not to mention the security budget.
|
Guideline
|
|
|
|
2018-01-08 17:09:47 |
Six Major Data Breach Trends From 2017 (lien direct) |
The IBM X-Force team monitored major data breach trends throughout 2017 and gleaned key insights to help companies avoid headline-grabbing security incidents and protect sensitive data.
|
|
|
|
|
2018-01-08 16:06:40 |
Blockchain Exploits and Mining Attacks on the Rise as Cryptocurrency Prices Skyrocket (lien direct) |
As the value of bitcoin and other cryptocurrencies skyrockets, fraudsters are developing new blockchain exploits and mining schemes to get their cut of the digital gold rush.
|
|
|
|
|
2018-01-04 03:56:11 |
CPU Vulnerability Can Allow Attackers to Read Privileged Kernel Memory and Leak Data (lien direct) |
A newly discovered hardware vulnerability underscores a microprocessor flaw that could allow an attacker to read data from privileged kernel memory.
|
|
|
|
|
2018-01-03 13:36:21 |
The Enterprise Imperative: Five Tips for Improving Incident Response (lien direct) |
According to IBM's Christopher Scott, who spoke at The Wall Street Journal's Pro Cybersecurity Executive Forum, the road to better incident response is "a marathon, not a sprint."
|
|
|
|
|
2018-01-03 11:56:17 |
No Place For Passivity in Cybersecurity Leadership (lien direct) |
Many organizations lack the cybersecurity leadership required to effectively defend their networks and proactively respond to data breaches when they do occur.
|
Guideline
|
|
|
|
2018-01-02 12:01:17 |
Security\'s Time Management Crunch and How to Solve It (lien direct) |
It seems like there's never enough hours in the day for security professionals, but effective time management can positively impact your security posture in unimaginable ways.
|
|
|
|
|
2018-01-02 12:00:15 |
Five New Year\'s Resolutions to Help CISOs Improve Enterprise Security in 2018 (lien direct) |
CISOs can improve their enterprise security posture by adopting cognitive technology, educating executives, conducting incident response training and fostering a culture of security in 2018.
|
|
|
|
|
2017-12-29 13:05:09 |
Rinse, Wash, Repeat: Defining, Planning and Continuously Improving Your SIEM Strategy (lien direct) |
For security leaders, the process of defining an SIEM strategy is never complete. A successful deployment requires careful planning, regular review and a culture of continuous improvement.
|
Guideline
|
|
|
|
2017-12-29 12:35:10 |
Transform Your Security Strategy to Avoid Digital Roadblocks (lien direct) |
To transform your security strategy, you must first establish a model of shared responsibility between security professionals and business units throughout the organization.
|
|
|
|
|
2017-12-28 12:56:09 |
Take a Dive: Deep Network Insights for Deeper Analytics (lien direct) |
Security analysts need access to deep network insights in the form of user behavior analytics to unlock the full potential of technologies such as artificial intelligence and machine learning.
|
|
|
|
|
2017-12-28 12:36:09 |
ADS-B and Aviation Cybersecurity: Should Passengers Be Concerned? (lien direct) |
ADS-B technology supplements pilots' situational awareness and provides valuable weather data, but it remains to be seen whether it will impact aviation cybersecurity and passengers' data privacy.
|
|
|
|
|
2017-12-27 13:01:09 |
Long Road Ahead or Unbridgeable Chasm? Lessons From the EY \'Global Information Security Survey\' (lien direct) |
The EY "Global Infomation Security Survey" revealed that CISOs and executives have a long road ahead when it comes to improving communication - but it is indeed a road, not an unbridgeable chasm.
|
|
|
|
|
2017-12-22 12:31:08 |
The Past, Present and Future of DNS Security (lien direct) |
As the fabric of the internet evolves, security professionals must be aware of DNS security threats, such as DDoS attacks and schemes designed to direct users to malicious websites.
|
|
|
|
|
2017-12-22 12:21:09 |
Drowning in a Sea of Passwords? It\'s Time to Adopt a Password Manager (lien direct) |
A password manager enables users to access all their login credentials with a single master password, eliminating the need to juggle multiple credentials to access various accounts.
|
|
|
|
|
2017-12-21 13:11:11 |
BGP Internet Routing: What Are the Threats? (lien direct) |
The rate of BGP internet routing attacks has not increased significantly in the past two years. It is a considerable threat, however, because it puts the stability of the internet at risk.
|
|
|
|
|
2017-12-21 13:06:05 |
Closing ATM Network Security Gaps to Stop Fraudsters in Their Tracks (lien direct) |
Banks are already privy to the threat of physical breaches, but many remain unaware of the ATM network security gaps that could enable fraudsters to access their systems.
|
|
|
|
|
2017-12-20 09:41:08 |
Readying Your Security Operations for 2018 and Beyond (lien direct) |
If you are planning to launch a new deployment or otherwise expand your security operations center (SOC) in 2018, ensure that cognitive technologies are available to help analysts digest threat data.
|
|
|
|
|
2017-12-20 09:36:06 |
Year in Review: How Did the Cyberthreat Landscape Change in 2017? (lien direct) |
Over the course of 2017, the cyberthreat landscape shifted to accommodate a sharper focus on pure data destruction for the sake of disruption rather than monetary gain.
|
|
|
|
|
2017-12-19 13:16:08 |
Mark Your Calendar for the Top Security Conferences of 2018 (lien direct) |
Security conferences offer IT professionals and enthusiasts an opportunity to network with peers, learn from experts and browse emerging technologies.
|
|
|
|
|
2017-12-19 12:46:06 |
Data Risk Management: How to Put Executives in the Driver\'s Seat (lien direct) |
Executives are increasingly viewing data risk management as an area that can reduce costs and increase information security.
|
|
|
|
|
2017-12-19 12:21:05 |
Cybersecurity Skills Wanted: Investigative and Analytical Minds, Lifelong Learners, Protectors and Consultants (lien direct) |
To keep up with the growing shortage of cybersecurity skills, companies are looking to tap new sources of talent, such as students and new collar workers.
|
|
|
|
|
2017-12-18 13:26:05 |
The Data Security Forecast Calls for Zero Trust (lien direct) |
To successfully implement a zero trust architecture, security teams must invest in data security solutions that continuously monitor access in real time.
|
|
|
|
|
2017-12-18 12:26:13 |
Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges (lien direct) |
Organizations that follow both the COSO enterprise risk management framework and the NIST CSF can vastly improve their cyber risk oversight and management.
|
|
|
|
|
2017-12-18 12:16:06 |
Looking Ahead: Three Bold Cybersecurity Predictions for 2018 (lien direct) |
As we wrap up one of the wildest years the industry has ever seen, the IBM Resilient team offered three bold cybersecurity predictions for 2018.
|
|
|
|
|
2017-12-15 12:56:05 |
Things to Consider When Calculating the Return on Security Investment (lien direct) |
The return on security investment is a crucial calculation to help CISOs demonstrate risks in business terms and gain executive buy-in for security tools.
|
|
|
|
|
2017-12-15 12:26:08 |
Are You Prepared for Omnichannel Fraud? (lien direct) |
Omnichannel fraud has evolved to exploit the myriad technologies retailers have developed to enable consumers to purchase goods anytime, anywhere.
|
|
|
|
|
2017-12-14 13:16:03 |
Secure Your Business Silently With Unified Identity and Access Management (lien direct) |
Unified identity and access management solutions from IBM enable security teams to silently protect their networks without disrupting the user experience.
|
|
|
|
|
2017-12-14 12:51:06 |
From Waterfall to SecDevOps: The Evolution of Security Philosophy (lien direct) |
Unlike the waterfall and agile approaches to development, SecDevOps requires security to be built into projects from the outset, not bolted on afterward.
|
|
|
|
|
2017-12-14 12:01:05 |
New Year, New Threats: Five Security Predictions That Will Take Hold in 2018 (lien direct) |
The IBM Security X-Force team offered some security predictions for new trends in the technology landscape and threats that are poised to emerge in 2018.
|
|
|
|