Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2016-05-17 11:15:54 |
Protection Against Cybercriminals Requires Vigilance (lien direct) |
Establishing protection against cybercriminals is a tall order for organizations, but it can begin with something as simple as paying attention. |
|
|
|
|
2016-05-16 13:01:07 |
Hacktivism: Fearmongering or Real Threat? (lien direct) |
Organizations must be prepared for possible hacktivism campaigns by arming themselves with the best defensive tools and security strategies. |
|
|
|
|
2016-05-16 10:15:55 |
Mobile Security Challenges: You\'re Not Alone (lien direct) |
A recent mobile security study from IBM revealed some of the challenges and benefits associated with moving to a mobile enterprise. |
|
|
|
|
2016-05-12 11:35:52 |
Is Imperfect Data Security Getting You Down? (lien direct) |
Here's what businesses really need to get a handle on data protection so imperfect data security doesn't get them down — or get them into trouble. |
|
|
|
|
2016-05-11 10:40:54 |
A Simpler, More Dynamic Way to Manage Endpoints (lien direct) |
IT departments must manage endpoints even as workplaces grow larger, networks get more complex and the workforce becomes more mobile. |
|
|
|
|
2016-05-10 10:00:54 |
Cognitive Security Helps Beat the Bad Guys at Unprecedented Scale and Speed (lien direct) |
IBM is introducing a cloud-based version of its cognitive security analytics solution that uses core Watson technology trained in the language of security. |
|
|
|
|
2016-05-09 12:55:51 |
Insider Attacks May Be Closer Than They Appear (lien direct) |
Security policies and employee education are just two of the many ways that organizations can mitigate the threat of insider attacks. |
|
|
|
|
2016-05-09 10:40:51 |
Saying Yes to No(SQL) Databases: Next-Generation Applications Can Be Secure (lien direct) |
NoSQL databases today come with rudimentary security installed, but with some extra foresight, you can completely up the ante to secure all applications. |
|
|
|
|
2016-05-08 11:50:53 |
The InfoSecond, Week of May 9, 2016 (lien direct) |
The top story in this week's InfoSecond is the massive global email hack in which 272 million user names and passwords were stolen and then traded online. |
|
|
|
|
2016-05-06 11:45:50 |
Does Mom Know Best About Internet Security? (lien direct) |
What does mom know about security? Probably more than we'd like to admit. Here are some of mom's favorite life lessons, security-style. |
|
|
|
|
2016-05-06 09:40:50 |
The Evolution of Voice Authentication as a Security Method (lien direct) |
Voice authentication has the potential to alter the security industry, but the access method comes with some drawbacks that should be considered. |
|
|
|
|
2016-05-05 11:35:50 |
Why I Quit Marketing IT Security Products (and Came Back Again) (lien direct) |
CASB has been around for a few years and presents a great opportunity for sellers to improve marketing IT security products and solutions. |
|
|
|
|
2016-05-04 13:35:51 |
How to Make the Most of Your Pen Test (lien direct) |
A pen test can be tremendously valuable for your team and organization, but you have to know how to glean the key lessons from the experience. |
|
|
|
|
2016-05-04 11:05:50 |
Six Reasons Use Cases Are Crucial for Building SIEM and Security Operations Capabilities (lien direct) |
Use cases can help your security information and event management (SIEM) and security operations teams improve their deployments and efficiency. |
|
|
|
|
2016-05-03 18:55:50 |
Bank Teller or Robber? Analytics, Predictive Insight and Agility Can Stop Data Breaches Before They Begin (lien direct) |
Are insiders leading to data breaches within your organization? The right security tools and analytics can help you find out — and prevent these incidents. |
Guideline
|
|
|
|
2016-05-03 18:45:51 |
Cloud Risks Pose the Latest Security Education Challenge (lien direct) |
Employees must be educated to avoid cloud risks and ensure this new era of cloud technology is a secure one for their organizations. |
|
|
|
|
2016-05-02 13:50:50 |
Lessons Learned From the Panama Papers: 10 Convenient Ways to Improve Your Security Protection (lien direct) |
The Panama Papers have shed a light on the risks involved with corporate data protection and underscored the importance of effective security measures. |
|
|
|
|
2016-05-02 10:50:49 |
Why Do Incidents Become Breaches? (lien direct) |
Organizations can prevent damaging data breaches by identifying assets, monitoring those assets and implementing a tested incident response plan. |
|
|
|
|
2016-05-01 13:45:49 |
The InfoSecond, Week of May 2: JIGSAW Ransomware, GozNym Malware and More! (lien direct) |
This week's InfoSecond takes a scary turn, with stories about the JIGSAW ransomware and the GozNym banking Trojan's rapid spread to Europe. |
|
|
|
|
2016-04-29 14:00:52 |
It\'s Time to Let Go of QuickTime for Windows (lien direct) |
IBM BigFix has a fixlet available for corporate users looking to uninstall QuickTime for Windows, which was found to have serious vulnerabilities. |
|
|
|
|
2016-04-29 11:40:48 |
A Future Full of Drones — and the Advanced Threats They Present (lien direct) |
Drones may be a relatively new technology, but there are a number of established risks and threats that need to be addressed by all organizations. |
|
|
|
|
2016-04-28 14:00:54 |
Mobile Malware Competition Rises in Underground Markets (lien direct) |
The mobile malware market is growing at an impressive rate, giving cybercriminals more options when it comes to infiltrating devices. |
|
|
|
|
2016-04-28 10:30:52 |
Understanding EdgeHTML\'s Attack Surface and Exploit Mitigations (lien direct) |
EdgeHTML's large attack surface can be daunting for users. Learn more about possible attacks as well as exploit mitigations that enhance security. |
|
|
|
|
2016-04-27 12:31:05 |
IBM MaaS360 Massively Reimagines Enterprise Mobility Management (lien direct) |
IBM has announced a number of updates and enhancements to its MaaS360 enterprise mobility management offering aimed at increasing mobile productivity. |
|
|
|
|
2016-04-27 10:05:49 |
Engaging Conversations Key to Improving Cyber Risk Decisions (lien direct) |
C-level executives, boards of directors and security leadership need to have engaging conversations to make better cyber risk decisions for the business. |
Guideline
|
|
|
|
2016-04-26 13:45:53 |
What\'s the Big Deal With the IBM BigFix Culture? (lien direct) |
What makes the culture at IBM BigFix so unique? Three employees give their opinions on working in the BigFix office and creating a great product. |
|
|
|
|
2016-04-26 10:50:48 |
SS7 Vulnerability Isn\'t a Flaw — It Was Designed That Way (lien direct) |
The SS7 vulnerability may have recently made headlines, but the flaw itself has actually been around for decades and is integral to the user experience. |
|
|
|
|
2016-04-25 10:00:49 |
Time Is Money: GozNym Launches Redirection Attacks in Poland (lien direct) |
The GozNym banking Trojan has pivoted its focus from targeting North American institutions to launching redirection attacks in Europe. |
|
|
|
|
2016-04-24 13:05:47 |
The InfoSecond, Week of April 25, 2016 (lien direct) |
Winter has come - and now it's gone, as Springtime has finally begun to arrive across the land. While you wait for this new season of 'Game of Thrones'... |
|
|
|
|
2016-04-22 14:00:48 |
The Price of Privacy: How Much Is Your Personal Data Worth to You? (lien direct) |
Consumers are looking forward to smart homes and connected devices, but what will the cost be to keep the personal data collected safe? |
|
|
|
|
2016-04-22 11:45:47 |
Information Security Across Industries: What\'s Hot? (lien direct) |
There are hot information security topics that are taking hold throughout various industries, and it's important to have a grasp on these concepts. |
|
|
|
|
2016-04-21 11:00:47 |
Four Simple Ways to Make Your Use of Cloud Applications 100 Times More Secure (lien direct) |
The widespread use of cloud applications can be beneficial for organizations, but it also opens them up to sophisticated cyberattacks. |
|
|
|
|
2016-04-20 13:15:50 |
IoT Security and the Automotive Industry: Highway Heaven or Driver Hell? (lien direct) |
It's clear from both IoT advocates and skeptics alike that security is the key to the continued technological maturity of the automotive industry. |
|
|
|
|
2016-04-20 09:45:48 |
Reviewing the Threat Landscape with IBM X-Force: Serious Data Breaches, Major Attacks and New Vulnerabilities (lien direct) |
The "IBM 2016 Cyber Security Intelligence Index" reveals IBM X-Force's collected data on the threat landscape and attack types affecting all industries. |
|
|
|
|
2016-04-19 11:15:46 |
Three Steps to Stop a Threat Before It Becomes an Incident (lien direct) |
Threats today use devices and servers to gain access to data and the corporate environment. That's why organizations need an incident response strategy. |
|
|
|
|
2016-04-18 13:15:53 |
Mobile Security: Hear That Train a Comin\' and Don\'t Let Mobile Fraud Hit You! (lien direct) |
Mobile fraud is coming to the enterprise, but luckily, there is time to get a comprehensive mobile security strategy launched for better protection. |
|
|
|
|
2016-04-15 19:38:55 |
What to Look for When It Comes to Identity and Access Governance (lien direct) |
What does it really take to have a successful identity and access governance program to centralize and govern your identity management? |
|
|
|
|
2016-04-15 19:38:12 |
E.ON Streamlines IT Audits: Identity Governance in Action (lien direct) |
Large organizations can solve problems related to identity governance and security compliance with the help of the right solutions. |
|
|
|
|
2016-04-15 12:21:33 |
How to Balance Low Investment Cost and High Risk Reduction in a Security Initiative (lien direct) |
Balancing risk reduction and costly security investments can be tricky, but one effective way to do it is by emphasizing user awareness training. |
|
|
|
|
2016-04-15 11:30:44 |
Why Do Companies Need an Enterprise Mobile Strategy? (lien direct) |
It is essential for enterprises to implement a holistic mobile security strategy that protects devices, manages access, enables collaboration and more. |
|
|
|
|
2016-04-14 13:35:45 |
Got WordPress? PHP C99 Webshell Attacks Increasing (lien direct) |
IBM MSS X-Force researchers found that C99 webshell attacks are increasing, particularly against content management systems such as WordPress. |
|
|
|
|
2016-04-14 11:55:42 |
Do You Know Where Your Data Goes When You Can\'t See It? (lien direct) |
As your cloud data traverses the world, it would be nice to know where it went. Organizations need cloud security governance processes for this reason. |
|
|
|
|
2016-04-14 10:00:47 |
Meet GozNym: The Banking Malware Offspring of Gozi ISFB and Nymaim (lien direct) |
The new GozNym hybrid takes the best of both the Nymaim and Gozi ISFB malware to create a powerful Trojan targeting banks in the U.S. and Canada. |
|
|
|
|
2016-04-13 12:00:44 |
Ransomware Attacks Will Not Stop Anytime Soon (lien direct) |
Ransomware attacks show no signs of slowing down, and the security solutions most organizations use are not enough to defend against this threat. |
|
|
|
|
2016-04-13 11:20:43 |
The Three Little Pigs on Hybrid Cloud Security: New Research on the Straw, Sticks and Bricks (lien direct) |
New research on hybrid cloud security identified the platform built with the strongest bricks will be ready to withstand any attack from big, bad wolves. |
|
|
|
|
2016-04-12 12:55:43 |
Securing the C-Suite, Part 2: The Role of CFOs, CMOs and CHROs (lien direct) |
The new 2016 "Securing the C-Suite" report from IBM revealed some insights and recommendations on the role of CFOs, CMOs and CHROs in cybersecurity. |
|
|
|
|
2016-04-12 12:00:44 |
Enhancing Incident Response: The Role of Strategic Partners in Your Security Posture (lien direct) |
Strategic relationships may be an organization's principal source for obtaining essential artifacts in incident response investigations. |
|
|
|
|
2016-04-12 11:05:43 |
When Operations Managers Speak Security Awareness, Do Employees Really Understand? (lien direct) |
Operations managers must have the education, resources and control needed to make smart business and security decisions for their local departments. |
|
|
|
|
2016-04-11 13:20:42 |
Be Preemptive and Be Prepared: How to Address Mobile Application Security Threats in Your Organization (lien direct) |
Achieving safe and effective mobile application security isn't impossible, but it does require a lot of time and effort from internal parties. |
|
|
|
|
2016-04-11 12:05:42 |
Why IT and Security Staff Need the Time and Budget to Go to Security Conferences (lien direct) |
Attending security conferences gives employees experience and connections that can help both themselves and their employers succeed. |
|
|
|