Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2016-08-03 10:55:16 |
What\'s in Your Event Cybersecurity Strategy? (lien direct) |
Event cybersecurity strategies and tools can help improve the digital security and, in turn, the physical security of guests at your event. |
|
|
|
|
2016-08-02 14:05:21 |
X-Force Red Gets Serious About Penetration Testing (lien direct) |
X-Force Red offers vulnerability analytics backed by the experience of hundreds of thousands of the world's best technologists. |
|
|
|
|
2016-08-02 11:45:22 |
Five Critical Steps to Effectively Selecting an Application Security Testing Provider (lien direct) |
Companies and organizations must consider a wide range of critical factors when selecting an application security testing provider. |
|
|
|
|
2016-08-02 08:45:22 |
Cloud Adoption and Challenges in Asia-Pacific (lien direct) |
Global cloud adoption has increased over the years and continues to grow at a rapid pace, especially in the Asia-Pacific region. |
|
|
|
|
2016-07-31 08:50:17 |
Hungry Hippos Meet Interactive Cyber Management at Black Hat USA 2016 (lien direct) |
A unique, interactive game at this year's Black Hat USA event will test players' ability to stay calm in a crisis, a key skill to have during a cyberattack |
|
|
|
|
2016-07-29 10:10:25 |
Read From PDF, Write to Edge\'s Memory (CVE-2016-0117) (lien direct) |
CVE-2016-0117 can be exploited to perform an arbitrary write to Edge's content process memory, a critical element for remote code execution. |
|
|
|
|
2016-07-28 11:05:20 |
Windows 10 Updates: What Does It Mean for Customers? (lien direct) |
Microsoft shifted its approach to updating its Windows OS platform with Windows 10. Here's what you have to know about the options for enterprises. |
|
|
|
|
2016-07-27 10:15:16 |
Exploring Operating Systems for the Internet of Things (lien direct) |
As the Internet of Things becomes more prevalent, the demand for the technologies needed to manage and secure devices becomes greater. |
|
|
|
|
2016-07-26 17:10:21 |
International Businesses Will Encounter Multijurisdictional Compliance Issues (lien direct) |
Companies engaging in international business, especially those with offices abroad, will undoubtedly encounter multijurisdictional compliance issues. |
|
|
|
|
2016-07-26 11:15:16 |
The Information Security Leader, Part 4: Three Persistent Challenges for CISOs (lien direct) |
Today's business climate presents challenges for CISOs regarding the definition of risk, uncertainties of measuring risk and effective communication. |
|
|
|
|
2016-07-26 07:10:21 |
The Cost of a Data Breach in India: What You Need to Know (lien direct) |
Indian companies should implement data security strategies such as encryption and threat sharing to reduce the impact and cost of a data breach. |
|
|
|
|
2016-07-25 12:45:22 |
Social Engineering and the Stranded Olympic Traveler (lien direct) |
Visitors to the 2016 Summer Olympic Games in Rio de Janeiro should be on high alert for the stranded traveler social engineering scam. |
|
|
|
|
2016-07-25 10:15:20 |
May the Best IAM Program Win: Four Steps to Shoot for the Gold (lien direct) |
A mature IAM program optimized to a business's objectives and the unique circumstances surrounding it can minimize the risk of data breaches. |
|
|
|
|
2016-07-22 12:00:30 |
Team With Experts for Security Analytics in the Cloud (lien direct) |
IBM QRadar on Cloud allows you to team with experts who can implement a security analytics platform and help control your evolving security environment. |
|
|
|
|
2016-07-22 08:15:14 |
The Onrushing Tsunami Known as the GDPR (lien direct) |
The GDPR is going to dramatically change how organizations conduct business throughout Europe. Here's what you need to know right now. |
|
|
|
|
2016-07-21 12:00:15 |
Going for Gold: Cybercrime and the Brazilian Threat Landscape (lien direct) |
The upcoming Summer Olympics in Rio de Janeiro provide an opportunity for cybercriminals to exploit the Brazilian threat landscape. |
|
|
|
|
2016-07-20 12:51:14 |
The Threat From Weaponized IoT Devices: It\'s Bigger Than You Think! (lien direct) |
Cybercriminals are leveraging IoT devices to carry out extremely sophisticated attacks. How do you protect yourself and your organization? |
|
|
|
|
2016-07-20 10:01:16 |
Blockchain Primer: It\'s Way More Than Just Bitcoin (lien direct) |
The future of blockchain goes far beyond the banking industry. In fact, this new element of security could have far-reaching consequences across sectors. |
|
|
|
|
2016-07-19 10:51:15 |
The Information Security Leader, Part 3: Four Fundamental Questions for Risk Analysis (lien direct) |
When it comes to a risk analysis, CISOs need to translate the question "How secure are we?" into one of the four fundamental questions about risk. |
|
|
|
|
2016-07-19 07:36:24 |
Three Enigmas Facing Indian Banks: Reputation, Regulation and Resources (lien direct) |
Indian banks struggle with the challenges posed by online banking and mobile banking. With new breakthroughs come new challenges. |
|
|
|
|
2016-07-18 10:36:13 |
Children\'s Health Care, Patient Records and Black Market Identity Theft (lien direct) |
Children's hospitals often fall victim to black market identity theft because their primary goal is treating patients — data security is secondary. |
|
|
|
|
2016-07-15 11:01:14 |
Share Services and Security Can Follow (lien direct) |
A panel titled "Share Your Services, Not Your Threats" discussed how government departments can share services without sacrificing security. |
|
|
|
|
2016-07-15 08:26:14 |
Can \'Angry Birds\' Help Make Sense of Security? (lien direct) |
The "Angry Birds" movie can teach security professionals a lot about what matters when it comes to identifying and responding to threats. |
|
|
|
|
2016-07-14 15:11:14 |
Look Who\'s Calling: The Rise of the Robocalls (lien direct) |
The FTC is fighting back against annoying and criminal robocalls, which have been made possible thanks to the growth of voice-over-IP (VoIP) technology. |
|
|
|
|
2016-07-14 10:21:35 |
Is Full Packet Capture Worth the Investment? (lien direct) |
Packet capture certainly isn't new, and more companies are seeing the value in it. But is full packet capture worth the investment? |
|
|
★★★★★
|
|
2016-07-13 10:26:12 |
CryptoLocker Ransomware Is on the Rise — Here\'s What to Do if You\'re Attacked (lien direct) |
The popularity of threats such as the CryptoLocker ransomware highlights some security best practices that can help enterprises avoid attacks. |
|
|
|
|
2016-07-12 11:51:15 |
The Information Security Leader, Part 2: Two Distinct Roles of a CISO (lien direct) |
Information security leaders today must be able to fill the two distinct roles of a CISO: the subject-matter expert and the trusted business adviser. |
Guideline
|
|
|
|
2016-07-12 09:31:15 |
The Insider Threat: Are You at Risk? (lien direct) |
Some security red flags, such as the presence of shadow IT and weak authentication practices, could indicate a high risk for an insider threat. |
|
|
|
|
2016-07-11 15:46:13 |
Risk-Based Security Lessons From Airport Lines (lien direct) |
Take some time to reflect on how airport security and initiatives from the TSA can influence risk-based security practices in the enterprise. |
|
|
|
|
2016-07-11 11:16:13 |
IDaaS: Life Before and After Cloud IAM (lien direct) |
A security expert spoke to Security Intelligence regarding how cloud IAM quickly solves common identity and access management problems. |
|
|
|
|
2016-07-08 19:36:15 |
GootKit: Bobbing and Weaving to Avoid Prying Eyes (lien direct) |
IBM X-Force researchers recently studied the GootKit banking Trojan — and the many ways it effectively evades detection and maintains persistence. |
|
|
★★★
|
|
2016-07-08 11:01:12 |
3-D Printing Vulnerabilities: Build Your Own Breach? (lien direct) |
A surge in 3-D printing vulnerabilities could leave the enterprise open to intellectual property theft or general process disruption. |
|
|
|
|
2016-07-07 13:01:18 |
Remote Code Execution in Xiaomi MIUI Analytics (lien direct) |
The IBM X-Force AppSec Research Team has discovered a remote code execution (RCE) vulnerability in MIUI, the flavor of Android developed by Xiaomi. |
|
|
|
|
2016-07-07 09:36:10 |
After the Brexit: Three New Challenges Facing European Security Leaders (lien direct) |
Now that the U.K. has voted in favor of the Brexit, security leaders across Europe will have to handle a few new challenges stemming from the move. |
Guideline
|
|
|
|
2016-07-06 17:31:11 |
Will Blockchain Technology Replace Traditional Business Models? (lien direct) |
Blockchain technology has become a hot trending topic within the computer world in the last couple years. There's more to it than just bitcoins. |
|
|
|
|
2016-07-06 11:01:13 |
Not All Heroes Wear Capes: How IAM Can Save You From Your Next Data Breach (lien direct) |
Identity and access management solutions that incorporate risk-based controls can help organizations avoid a potentially harmful data breach. |
|
|
|
|
2016-07-05 12:56:08 |
The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges (lien direct) |
An information security leader today needs to fill multiple roles and be capable of addressing new challenges related to managing risk. |
Guideline
|
|
|
|
2016-07-05 12:01:12 |
Account Takeovers: They Can Happen to Anyone (lien direct) |
Social media account takeovers have recently impacted some high-profile individuals and groups, but a few simple measures can greatly reduce this risk. |
|
|
|
|
2016-07-05 10:06:10 |
BadTunnel: Bad News? (lien direct) |
The recently discovered BadTunnel could mean bad news for Microsoft Windows users — that is, unless they move to patch their systems immediately. |
|
|
|
|
2016-07-01 11:56:07 |
Five Ways to Help Your Alma Mater Take Data Security to the Next Level (lien direct) |
Is your alma mater protecting your personal information? Learn how you can help academia take its data security to the next level. |
|
|
|
|
2016-07-01 06:36:10 |
Are You Prepared to Handle the Cost of a Data Breach? (lien direct) |
The cost of a data breach for organizations in the Asia-Pacific region is rising. Here's what enterprises can do to limit these negative consequences. |
|
|
|
|
2016-06-30 14:56:12 |
Integrated Security Solutions for Hybrid Cloud Deployments (lien direct) |
Special security solutions are needed to protect hybrid cloud environments through managed access, data protection and network visibility. |
|
|
|
|
2016-06-30 11:06:09 |
Network Mapping: Better Than Asset Inventory, but Not by Much (lien direct) |
Adding elements of security intelligence to your network mapping can make a big difference in your organization's security practices. |
|
|
|
|
2016-06-29 12:01:12 |
IBM MaaS360 Answers the Call for Secure Chat in the Enterprise (lien direct) |
Enterprises searching for a secure chat can benefit from IBM MaaS360's instant messaging service, designed to enable productivity and data protection. |
|
|
|
|
2016-06-28 14:16:24 |
Sniffles, Sore Throat and Itchy Eyes: How Security Analytics Benefits From Health Care Investments (lien direct) |
Much like health care professionals provide a diagnosis based on symptoms, security analytics allows experts to focus on the most severe threats. |
|
|
|
|
2016-06-28 11:51:08 |
Planes, Trains and Automobiles (and More): No Shortage of Attack Targets in Transportation (lien direct) |
The transportation industry is a large target for cybercriminals, and the only way to avoid damaging attacks is to be proactive about security. |
|
|
|
|
2016-06-28 10:31:09 |
Security Glue: How Threat Intelligence Binds Security Providers and Partners (lien direct) |
Threat intelligence is the glue that holds security together. It helps create a picture of the most serious threats facing any organization. |
|
|
|
|
2016-06-27 13:36:08 |
Midyear Review: The Continuing Challenge of Financial Services Threats (lien direct) |
Experts made several predictions surrounding financial services threats at the beginning of the year. Halfway through 2016, where do we stand? |
|
|
|
|
2016-06-27 11:16:11 |
What Is IDaaS? A CISO Clears Up Confusion Around the Definition of Cloud IAM (lien direct) |
In an interview, one chief information security officer provides a clear definition of IDaaS, or cloud-based identity and access management. |
|
|
|
|
2016-06-27 08:26:07 |
IoT Security: A Government Perspective (lien direct) |
The Internet of Things (IoT) is changing everything — even how the government operates. But these bodies need to put security and citizen safety first. |
|
|
|