Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2016-11-23 13:10:21 |
\'In Security\' Web Comic, Episode 003: To the Command Center (lien direct) |
The Every App team visits the IBM X-Force Command Center to see what can be done about Pandapocalypse. Can the Cyber Range help improve their response?
|
|
|
|
|
2016-11-23 12:30:16 |
IT and Business Leaders Collaborate to Protect Critical Data (lien direct) |
It takes a collaborative effort between IT and business leaders to protect critical data from cybercriminals and sustain a competitive advantage.
|
Guideline
|
|
|
|
2016-11-23 11:45:15 |
Travel Security Tips for Personal and Business Trips (lien direct) |
Before leaving for a business trip, be sure to keep these basic travel security tips in mind to keep your data safe from local adversaries.
|
|
|
|
|
2016-11-22 14:30:16 |
Football and Firewalls: A Winning Game Plan to Improve Network Security (lien direct) |
Your network security playbook should include an intrusion prevention system (IPS) to detect and respond to threats your firewall misses.
|
|
|
|
|
2016-11-22 13:00:19 |
The Role of Cognitive Security in Addressing the Incident Response Speed Gap (lien direct) |
Respondents to an IBV survey identified incident response speed as the most pressing security challenge. Cognitive security tools can close this speed gap.
|
|
|
|
|
2016-11-22 12:30:19 |
A Year in Collaborative Defense With IBM Security App Exchange (lien direct) |
Data from the IBM Security App Exchange's first year offers valuable insights into download patterns and the direction of the cybersecurity market overall.
|
|
|
|
|
2016-11-21 13:35:13 |
It\'s Time for the Democratization of Cybersecurity Data (lien direct) |
The widespread democratization of cybersecurity data would enable the IT industry to keep up with cybercriminals who always seem to be one step ahead.
|
|
|
|
|
2016-11-21 13:00:17 |
Gartner IAM Summit and Upcoming Webinars Highlight Identity Governance and Intelligence (lien direct) |
IBM Security will showcase its identity governance and intelligence solution at the upcoming 2016 Gartner IAM Summit, and during two webinars in December.
|
|
|
|
|
2016-11-21 12:15:14 |
Protect Sensitive Files With Document Security Management (lien direct) |
Although most companies have invested in file management tools, document security remains a challenge due to widespread mobile use and BYOD culture.
|
|
|
|
|
2016-11-18 13:55:14 |
Ninety-Five Percent of Webshell Attacks Written in PHP (lien direct) |
Webshells are dangerous in the hands of APT groups. According to IBM Managed Security Services (MSS), 95 percent of webshell attacks are written in PHP.
|
|
|
|
|
2016-11-18 13:05:13 |
Retail Cybersecurity: Black Friday and Cyber Monday Are Upon Us (lien direct) |
Retail cybersecurity is critical during the holiday season, particularly during the Black Friday and Cyber Monday national shopping events.
|
|
|
|
|
2016-11-18 13:00:16 |
Cybersecurity Lessons From the 2016 Presidential Election (lien direct) |
The 2016 presidential election offered many cybersecurity lessons and highlighted the importance of securing all types of data.
|
|
|
|
|
2016-11-17 14:25:14 |
Getting on the Right Track With a Security Immune System (lien direct) |
An integrated security immune system can help IT teams cope with the evolving threat landscape that is outpacing traditional solutions.
|
|
|
|
|
2016-11-17 13:31:12 |
Big Data Solutions Make Big Targets (lien direct) |
Big data solutions can aggregate, index and analyze many types of data to produce advanced business insights. This makes them juicy targets for fraudsters.
|
|
|
|
|
2016-11-17 09:45:14 |
Three Ways Effective Cyber Resilience Helps You Stay Cool in Moments of Chaos (lien direct) |
IBM's new X-Force Command Centers, Cyber Range and IRIS team can help security teams establish an effective cyber resilience strategy.
|
|
|
|
|
2016-11-16 17:00:35 |
IBM X-Force IRIS: Bringing a New Approach to Incident Response (lien direct) |
IBM formed the X-Force IRIS team to collaborate with clients to design solutions for today's most challenging cybersecurity issues and threats.
|
|
|
|
|
2016-11-16 16:00:34 |
Crisis Leadership: The Missing Link in Cyberattack Defense (lien direct) |
C-suite executives often lack the experience and training required to establish and lead a successful cyberattack defense program.
|
Guideline
|
|
|
|
2016-11-15 13:15:33 |
Using Cognitive Security Solutions to Combat Cyber Scum and Villainy (lien direct) |
Cognitive security solutions will help IT analysts tackle long-term strategic issues rather than firefighting against the overwhelming volume of threats.
|
|
|
|
|
2016-11-15 12:25:30 |
The Next Wave of Identity Management Must Meet the Goal of One True Identity (lien direct) |
The third wave of the internet requires an approach to identity management that recognizes the need to share PII selectively to maximize its value.
|
|
|
|
|
2016-11-15 08:40:32 |
The Indian IoT Market Is Exploding Despite Gaping Security Holes (lien direct) |
The rapid growth of the Indian IoT market is encouraging, but more connected devices mean more vulnerabilities for cybercriminals to exploit.
|
|
|
|
|
2016-11-14 14:15:32 |
Cybercriminals Are Getting Better at Using Advanced Authentication Methods (lien direct) |
Cybercriminals are becoming more advanced and learning how to leverage the latest authentication methods to exploit security weaknesses.
|
|
|
|
|
2016-11-14 12:50:36 |
Automated Quality and Application Security Testing, Part 2: Straight Out of the Gate (lien direct) |
To conduct effective automated quality and application security testing, app developers must test each feature repeatedly at various stages of development.
|
|
|
|
|
2016-11-14 11:40:31 |
20 Eye-Opening Cybercrime Statistics (lien direct) |
The many security reports issued this year contain countless cybercrime statistics that should encourage IT professionals and end users to be more careful.
|
|
|
|
|
2016-11-11 13:40:31 |
Understanding the CIO\'s Role in Security (lien direct) |
The CIO's role in security includes understanding the company's key vulnerabilities, spreading internal awareness and communicating with top executives.
|
|
|
|
|
2016-11-11 13:05:30 |
HIPAA, Fines and Your Business Associate Agreement (lien direct) |
Health care companies must review every business associate agreement to ensure that it aligns with HIPAA requirements and that PHI is properly secured.
|
|
|
|
|
2016-11-11 12:30:32 |
Security Starts With People: What it Takes to Ensure Simple Yet Strong Authentication on Mobile (lien direct) |
IT professionals and mobile app developers must figure out a way to implement strong authentication capabilities without complicating the user experience.
|
|
|
|
|
2016-11-10 13:55:31 |
10 Grid Security Considerations for Utilities (lien direct) |
It's important to consider factors related to operations and infrastructure, not just threats, when discussing grid security for the utilities industry.
|
|
|
|
|
2016-11-10 13:00:33 |
Using Layered Security to Keep Warm for the Winter (lien direct) |
Security teams must implement layered security capabilities to defend against the variety of threats fraudsters launch to capitalize on the holiday bustle.
|
|
|
|
|
2016-11-10 12:40:31 |
The Rise of the Cashless Society (lien direct) |
As cryptocurrencies gain traction with banks and consumers, IT professionals must consider the cybersecurity implications of becoming a cashless society.
|
|
|
|
|
2016-11-09 14:15:31 |
Fantasy League Security Risks Could Spoil a Season (lien direct) |
The online fantasy sports gaming industry is growing rapidly. Unfortunately, so is the list of fantasy league security risks that threaten users' data.
|
|
|
|
|
2016-11-09 13:00:33 |
PSD2: Ready, Steady, Go (lien direct) |
The revised Payments Services Directive (PSD2) is designed to open the online banking and e-commerce markets to new forms of regulated payments.
|
|
|
|
|
2016-11-09 12:25:34 |
Tricks of the Trade: A Deeper Look Into TrickBot\'s Machinations (lien direct) |
Researchers discovered a new banking Trojan, TrickBot, that appears to borrow an uncommon webinjection technique from the infamous Dyre family of malware.
|
|
|
|
|
2016-11-08 18:30:34 |
An Aggressive Launch: TrickBot Trojan Rises With Redirection Attacks in the UK (lien direct) |
IBM X-Force researchers reported that TrickBot is fully operational and already capable of deploying two of the most advanced browser manipulation methods.
|
|
|
|
|
2016-11-08 13:10:32 |
Getting Primed to Adopt Cognitive Security Solutions (lien direct) |
IT professionals are beginning to adopt cognitive security solutions to help them speed up response times and identify threats more effectively.
|
|
|
|
|
2016-11-08 12:40:31 |
Consequences of IoT and Telnet: Foresight Is Better Than Hindsight (lien direct) |
Cybercriminals have learned how to exploit the IoT and Telnet servers to commit record-shattering DDoS attacks against major websites.
|
|
|
|
|
2016-11-07 13:50:31 |
Finding the Right Apps to Streamline Data Collection (lien direct) |
The IBM Security App Exchange includes over 70 applications to help security teams streamline data collection and share information more efficiently.
|
|
|
|
|
2016-11-07 13:30:53 |
Automated Quality and Application Security Testing, Part 1: How to Be Agile With Your Agile Adoption (lien direct) |
Agile adoption enables security professionals to deliver high-quality, secure software and eliminate the pitfalls common to traditional strategies.
|
|
|
|
|
2016-11-07 13:00:33 |
Five Easy Pieces: How Machine Learning Is Already Boosting Cybersecurity (lien direct) |
IT professionals are turning to machine learning solutions to help them reduce the rate of false positives and monitor huge volumes of data in real time.
|
|
|
|
|
2016-11-04 14:00:53 |
The Internet of Trouble: Securing Vulnerable IoT Devices (lien direct) |
In the past few months, researchers have observed large-scale DDoS attacks that leverage vulnerable IoT devices to create massive botnets.
|
|
|
|
|
2016-11-04 13:50:35 |
How to Add User-Defined AQL Functions in QRadar (lien direct) |
IT professionals can leverage user-defined AQL functions in QRadar to perform complex calculations and analyze data retrieved from the Ariel databases.
|
|
|
|
|
2016-11-04 13:40:31 |
It Only Has to Happen Once: Protecting Your Brand in the Digital Age (lien direct) |
The challenge of protecting your brand is growing as ransomware and other targeted attacks become increasingly frequent and complex.
|
|
|
|
|
2016-11-03 12:39:01 |
Cognitive Security to the Rescue? Study Predicts Widespread Adoption in the Next Few Years (lien direct) |
According to a recent survey conducted by the IBM Institute of Business Value (IBV), the era of cognitive security may be coming sooner than we think.
|
|
|
|
|
2016-11-03 11:31:05 |
Changing of the Guard: Three Considerations for Your Next IPS Purchase (lien direct) |
Recent changes in the security market have influenced many IT professionals to focus on the long-term success of their programs when shopping for an IPS.
|
|
|
|
|
2016-11-02 14:13:37 |
Windows 10: Here to Stay in a Big Way (lien direct) |
With Windows 10, Microsoft sought to make the tools employees have grown to love compatible with the smartphones and tablets they prefer to use on the go.
|
|
|
|
|
2016-11-02 12:35:15 |
Seasonal Employee Security Risks: Present Danger, Proactive Defense (lien direct) |
Companies that enlist extra help during the holidays must carefully vet temporary hires and restrict access to manage seasonal employee security risks.
|
|
|
★★
|
|
2016-11-02 09:48:15 |
The Art and Science of How Spam Filters Work (lien direct) |
Few truly understand how spam filters work, but nearly every internet user benefits from the security they provide on a daily basis.
|
|
|
|
|
2016-11-01 19:21:22 |
Lessons From the Dyn DDoS Attack (lien direct) |
Domain name provider Dyn suffered the largest DDoS attack in history on Oct. 21. DDoS is nothing new, but the attack highlights some alarming trends.
|
|
|
|
|
2016-11-01 19:15:32 |
Vulnerability Management: Do You Know Your Risks? (lien direct) |
Vulnerability management is a critical part of any security program, but many IT professionals fail to realize that it starts with risk management.
|
|
|
|
|
2016-11-01 10:30:53 |
Track Relevant Vulnerabilities With Watchlists (lien direct) |
The watchlist feature on IBM X-Force Exchange enables network administrators to maintain accurate asset inventories and track relevant vulnerabilities.
|
|
|
|
|
2016-10-31 14:47:17 |
Seven Ways to Optimize Your Application Security Testing Program (lien direct) |
Organizations often neglect to perform adequate application security testing due to concerns about timing, budget, expertise and resource constraints.
|
|
|
|