Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2017-09-14 12:45:35 |
The New CISO: Management Through Thought Leadership (lien direct) |
The CISO can positively impact both organizational security and his or her own professional brand through thought leadership.
|
Guideline
|
|
|
|
2017-09-11 12:11:56 |
CTRL-ALT-DELETE Before You Leave Your Seat! Security Awareness and Training Through Positive Reinforcement (lien direct) |
Security leaders should infuse positive reinforcement into their security awareness and training programs to encourage users to adopt best practices.
|
Guideline
|
|
|
|
2017-09-05 12:20:29 |
The Security Leader\'s Expanding Role: Seven Priorities to Drive CISO Success (lien direct) |
Today's CISO needs to be more than just a security leader. The role now demands constant communication, continuous education and acute business sense.
|
Guideline
|
|
|
|
2017-08-16 11:50:25 |
IDaaS Vendors: IBM Cloud Identity Service Named Market Leader in Six Recent Analyst Reports (lien direct) |
IBM Cloud Identity Service was named a leader in six recent industry reports, solidifying IBM's reputation as one of the industry's top IDaaS vendors.
|
Guideline
|
|
|
|
2017-07-12 11:15:24 |
Outsider or Insider: Who Will Cause Today\'s Data Breach? (lien direct) |
Security leaders must defend sensitive enterprise information from both external actors and negligent insiders who might accidentally cause a data breach.
|
Guideline
|
|
|
|
2017-07-11 12:00:32 |
The Promise of a Unified App Catalog for the Enterprise (lien direct) |
A unified app catalog can help IT leaders properly manage the mobile workforce and secure disparate applications running on different operating systems.
|
Guideline
|
|
★★★★
|
|
2017-07-07 11:10:23 |
The Cybersecurity Skills Gap Is No Match for Cognitive Security (lien direct) |
Cognitive security tools enable SOC analysts to bridge gaps in intelligence, speed and accuracy, and empowers team leaders to address the IT skills gap.
|
Guideline
|
|
|
|
2017-06-29 10:00:33 |
IBM Named a Leader in Inaugural Gartner Magic Quadrant for Access Management, Worldwide (lien direct) |
Gartner recognized IBM as a Leader for its completeness of vision and ability to execute in the first ever Magic Quadrant for Access Management, Worldwide.
|
Guideline
|
|
|
|
2017-06-28 11:30:20 |
Four Ways CISOs Can Play a Key Role in Educating Top Leadership About Cyber Risks (lien direct) |
Security leaders must translate their technical expertise into business insights when communicating cyber risks to executives and board directors.
|
Guideline
|
|
|
|
2017-06-14 11:46:20 |
Creating a Culture of Security Through Change Management (lien direct) |
Effective change management requires thorough planning, constant communication, and strong leadership capable of swaying the organizational culture.
|
Guideline
|
|
★★★★
|
|
2017-06-13 11:31:18 |
Addressing Security Gaps in the Energy Industry (lien direct) |
To address security gaps in the energy industry, organizations must empower leaders to take full responsibility for cyberdefense and hold them accountable.
|
Guideline
|
|
|
|
2017-06-12 11:36:14 |
Asleep at the Switches: Don\'t Let Cyber Fatigue Catch Your Enterprise Off Guard (lien direct) |
To combat cyber fatigue, security leaders must communicate the importance of password hygiene without diluting the message.
|
Guideline
|
|
|
|
2017-06-08 16:51:22 |
IBM Picks Up Six: A Leader in 2017 Gartner Magic Quadrant for Enterprise Mobility Management (lien direct) |
IBM was named a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for the sixth consecutive year.
|
Guideline
|
|
|
|
2017-06-05 13:01:16 |
Security Awareness: How to Make Your Weakest Link Part of Your Defense (lien direct) |
A well-aligned, orchestrated security awareness program can help IT leaders strengthen the weakest link in any security program: users.
|
Guideline
|
|
|
|
2017-06-05 09:51:14 |
Embracing the GDPR as a Catalyst for Innovation (lien direct) |
Now is the time for security leaders to stop talking about the GDPR and start acting to achieve compliance before the law takes effect in May 2018.
|
Guideline
|
|
|
|
2017-05-24 12:56:08 |
Don\'t Sit Back and Wait for Security Risks to Disappear (lien direct) |
Many IT leaders and executives simply accept security risks as a result of poor decisions based on fear, misinformation and flawed insights.
|
Guideline
|
|
|
|
2017-05-24 12:01:13 |
Empower Your Employees to Become Security Awareness Champions (lien direct) |
Security leaders must tailor their security awareness training programs to the particular needs and goals of the employees in their departments.
|
Guideline
|
|
|
|
2017-05-22 10:31:10 |
Cybersecurity Hiring Woes? Time to Consider a New Collar Approach (lien direct) |
IBM is leading an industrywide effort to close the IT skills gap by hiring new collar professionals who lack formal degrees but possess requisite skills.
|
Guideline
|
|
|
|
2017-05-19 11:31:09 |
Traditional Approaches to User Security Training Are Creating Unnecessary Risks (lien direct) |
To make user security training more effective, IT leaders must engage employees with a more creative - and less boring - approach.
|
Guideline
|
|
|
|
2017-05-09 13:01:07 |
Is the CISO Job Market Overcrowded? (lien direct) |
The CISO job market is full of qualified and underemployed security leaders champing at the bit to provide value to organizations.
|
Guideline
|
|
|
|
2017-05-08 11:11:06 |
Cybersecurity Leadership in Transition: A View From the Classroom (lien direct) |
Cybersecurity leadership courses traditionally focus on imparting subject matter expertise, but the next generation of CISOs must also be trusted advisors.
|
Guideline
|
|
|
|
2017-05-01 12:26:00 |
How to Become a Successful CISO (lien direct) |
A career as a CISO can be highly rewarding, but it's not all glitz and glamor. Security leaders must be tactful, strategic and communicative to succeed.
|
Guideline
|
|
|
|
2017-04-05 12:25:52 |
Signs That You\'re About to Suffer a Security Breach (lien direct) |
Security leaders must communicate effectively with executives and monitor users for signs that the organization is about to suffer a security breach.
|
Guideline
|
|
|
|
2017-04-04 11:55:52 |
Is the Security Community Out of Touch? (lien direct) |
Instead of waiting for industry giants to take the lead, the security community should encourage dialogue and collaborate to create a security framework.
|
Guideline
|
|
|
|
2017-03-30 12:50:51 |
Do We Need to Worry About Shadow IT? (lien direct) |
Shadow IT is still a challenge for organizations. Security leaders should provide users with the tools they need and monitor unsanctioned use carefully.
|
Guideline
|
|
|
|
2017-03-30 12:05:50 |
CISO Complexity: A Role More Daunting Than Ever (lien direct) |
Given the growing number of compliance requirements and advanced threats security leaders must deal with, CISO complexity is at an all-time high.
|
Guideline
|
|
|
|
2017-03-22 12:55:46 |
Breaking Down Barriers to Information Security Progress (lien direct) |
Information security programs need to progress to meet the challenges of today and tomorrow, but it's not easy for leaders to overcome common barriers.
|
Guideline
|
|
|
|
2017-03-22 11:10:48 |
Securing Your Cloud-Based Resources: Start With These Four Areas (lien direct) |
With cloud-based resources becoming an integral part of the enterprise, it's time for security leaders to recognize the best ways to protect these assets.
|
Guideline
|
|
|
|
2017-03-17 13:10:48 |
Your Cybercriminal Has an Image Problem (lien direct) |
The classic image of the Hollywood hacker is misleading. The typical cybercriminal is more likely to be a state-sponsored actor or malicious insider.
|
Guideline
|
|
|
|
2017-03-14 12:10:46 |
QRadar Waves From the Leader Position in the Forrester 2017 Security Analytics Wave (lien direct) |
IBM Security was recognized as a leader in the first ever Forrester Security Analytics Wave, earning the highest scores in solution strength and vision.
|
Guideline
|
|
|
|
2017-03-13 12:55:44 |
The Enterprise Mobility Conundrum: How to Control the Data? (lien direct) |
Businesses can benefit from BYOD policies, but IT leaders must implement the right enterprise mobility solutions to protect their sensitive data.
|
Guideline
|
|
|
|
2017-03-06 15:05:41 |
Building a Cybersecurity Culture Around Layer 8 (lien direct) |
IT leaders must develop a strong cybersecurity culture to promote awareness and accountability, and to empower employees to learn and develop.
|
Guideline
|
|
|
|
2017-03-06 13:00:46 |
Closing Cloud Security Gaps at Every Step of the Migration Process (lien direct) |
When moving data and services to the cloud, IT leaders must implement cloud security measures at every step of the complex migration process.
|
Guideline
|
|
|
|
2017-03-03 12:45:49 |
IBM Retains Leadership Position in 2017 Gartner Magic Quadrant for Application Security Testing (lien direct) |
In the most recent update to the Gartner Magic Quadrant for Application Security Testing report, IBM maintained its position in the "Leaders" Quadrant.
|
Guideline
|
|
|
|
2017-02-27 13:00:45 |
IBM Is a Leader, Again, in the 2017 Gartner Magic Quadrant for IGA (lien direct) |
IBM Security was named a Leader in the recently published "2017 Gartner Magic Quadrant for IGA" for the third consecutive year.
|
Guideline
|
|
|
|
2017-02-22 13:50:41 |
Time to End the Tension Between Corporate Remediation and Security Teams (lien direct) |
Although remediation and security teams are working toward a common goal, their conflicting priorities, culture and tools often lead to discord.
|
Guideline
|
|
|
|
2017-02-22 13:00:44 |
The Disconnected Digital World (lien direct) |
As we continue our transformation into a digital world, IT leaders must find ways to resolve disconnects related to communication, policy, tools and more.
|
Guideline
|
|
|
|
2017-02-22 11:45:40 |
Adaptive Security: The Safety Net in the Flying Trapeze Act (lien direct) |
IT leaders should use adaptive security solutions as a safety net to protect user, customer and corporate data from fraudsters.
|
Guideline
|
|
|
|
2017-02-20 13:40:39 |
Shadow IT Comes of Age (lien direct) |
Harnessing shadow IT starts with security leaders. IT and security teams must work together to identify problem areas and provide quality solutions.
|
Guideline
|
|
|
|
2017-02-16 12:05:37 |
CSOs Who Understand the User Experience Deliver Better Security (lien direct) |
A smooth user experience leads to more secure systems and databases. CSOs should consult users directly to resolve issues related to the data they access.
|
Guideline
|
|
|
|
2017-02-14 12:35:36 |
Learn to Love Online Dating Security (lien direct) |
IT leaders must educate employees about online dating security to minimize the risks associated with the use of these services in the workplace.
|
Guideline
|
|
|
|
2017-02-13 10:00:41 |
It\'s Time to Go Beyond Next-Generation Endpoint Security (lien direct) |
To protect the most vulnerable gateways into their networks, IT leaders must go beyond next-generation endpoint security with IBM BigFix Detect.
|
Guideline
|
|
|
|
2017-02-02 12:30:37 |
Is IoT Security an Oxymoron? (lien direct) |
As the Internet of Things continues to expand, IT leaders must prepare accordingly or find themselves vulnerable to countless IoT security threats.
|
Guideline
|
|
|
|
2017-02-01 15:30:36 |
Increased Regulatory Compliance Is Choking the CISO (lien direct) |
CISOs and other business leaders are struggling to maintain regulatory compliance as government agencies continue to devise new, complicated laws.
|
Guideline
|
|
|
|
2017-02-01 14:05:43 |
IBM Named a Leader in 2016 Gartner Magic Quadrant for Managed Security Services (MSSP) (lien direct) |
IBM was named a Leader in the 2016 Gartner Magic Quadrant for Managed Security Services due in large part to positive testimonials from IBM clients.
|
Guideline
|
|
|
|
2017-01-25 17:00:36 |
Crisis Leadership, Part 2: What Are We Learning? (lien direct) |
In addition to responding to threats in progress, crisis leadership involves rehearsing various responses to prepare for a data breach.
|
Guideline
|
|
|
|
2017-01-23 15:00:35 |
IBM Plans to Acquire Agile 3 Solutions to Help Executives Manage Their Critical Data (lien direct) |
IBM recently announced its plan to acquire Agile 3 Solutions, a leader in business risk dashboarding and data visualization.
|
Guideline
|
|
|
|
2017-01-23 13:00:36 |
An Evolving Threat: Ransomware in 2017 (lien direct) |
IT leaders must prepare to protect their environments from new types of ransomware in 2017, since the new year is sure to bring fresh threats.
|
Guideline
|
|
|
|
2017-01-17 10:55:30 |
Know Your Security Loopholes to Outsmart Lurking Cyberthreats (lien direct) |
IT managers must know what types of data cybercriminals covet to close any security loopholes that might lead to a security breach.
|
Guideline
|
|
|
|
2017-01-12 13:25:28 |
Charisma Killed the Cat: Fostering an Effective Cybersecurity Leadership Style (lien direct) |
Too much charisma can make for ineffective cybersecurity leadership. CISOs should encourage IT employees to challenge their policies and decision-making.
|
Guideline
|
|
|