Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2017-01-11 12:50:28 |
Don\'t Let Remote Management Software Contribute to Building Botnets (lien direct) |
IT leaders must be vigilant when using remote management software. Attackers can exploit these tools to infect devices with malware and build botnets.
|
Guideline
|
|
|
|
2017-01-02 11:10:27 |
2017: A New Year\'s Security Resolution (lien direct) |
IT leaders should make a security resolution to improve basic hygiene, back up data regularly and share threat information to fight cybercrime in 2017.
|
Guideline
|
|
|
|
2016-12-21 11:30:24 |
Adopting PaaS: Tips and Best Practices for Cloud Transformation (lien direct) |
When adopting PaaS solutions, IT leaders must consider the many security concerns that arise when data is stored and shared using cloud services.
|
Guideline
|
|
|
|
2016-12-14 13:50:21 |
Five Signs of CISO Complacency (lien direct) |
CISO complacency can lead to anxiety and ambiguity, which can erode team morale and cause IT departments to miss important details with no accountability.
|
Guideline
|
|
|
|
2016-12-06 12:40:18 |
Real-Time Payments, Real-Time Fraud Risks? (lien direct) |
Programs such as NACHA's Faster Payments initiative may help U.S. businesses become more competitive, but shorter transaction times lead to fraud risks.
|
Guideline
|
|
|
|
2016-11-29 12:10:18 |
Cognitive Security Key to Addressing Intelligence and Accuracy Gaps (lien direct) |
Cybersecurity leaders hope to use cognitive security solutions to improve detection and incident response capabilities and reduce false positives.
|
Guideline
|
|
|
|
2016-11-23 12:30:16 |
IT and Business Leaders Collaborate to Protect Critical Data (lien direct) |
It takes a collaborative effort between IT and business leaders to protect critical data from cybercriminals and sustain a competitive advantage.
|
Guideline
|
|
|
|
2016-11-16 16:00:34 |
Crisis Leadership: The Missing Link in Cyberattack Defense (lien direct) |
C-suite executives often lack the experience and training required to establish and lead a successful cyberattack defense program.
|
Guideline
|
|
|
|
2016-10-28 12:46:24 |
Questions Every CIO Should Ask the Cybersecurity Leader: Part 3 (lien direct) |
The cybersecurity leader and CIO must collaboratively address 10 common risk management controls to protect the organization's most sensitive data.
|
Guideline
|
|
|
|
2016-10-25 11:14:50 |
The Role of the CISO and Information Security in the Construction Industry (lien direct) |
Many companies fail to recognize the importance of information security in the construction industry. A CISO or CIO is critical to lead security efforts.
|
Guideline
|
|
|
|
2016-10-25 09:52:02 |
Global City CIOs Launch New Organization to Promote Best Smart City Practices (lien direct) |
A group of IT leaders from around the world formed the Council of Global City CIOs to promote information sharing when it comes to smart city initiatives.
|
Guideline
|
|
|
|
2016-10-24 12:50:21 |
Learn How to Protect Yourself From Yourself With Identity Governance and Intelligence (lien direct) |
An effective identity governance and intelligence solution enables IT leaders to manage and monitor the levels of access granted to each individual user.
|
Guideline
|
|
|
|
2016-10-21 12:56:03 |
Questions Every CIO Should Ask the Cybersecurity Leader: Part 2 (lien direct) |
When it comes to building a secure IT program, the CIO must ask the cybersecurity leader the right questions to devise an effective incident response plan.
|
Guideline
|
|
|
|
2016-10-14 12:43:55 |
Questions Every CIO Should Ask the Cybersecurity Leader: Part 1 (lien direct) |
Many organizations lack an efficient risk prioritization strategy. A healthy transformation requires cooperation between the CIO and cybersecurity leader.
|
Guideline
|
|
★★
|
|
2016-10-07 12:56:43 |
ASN.1 Compiler Causes a Network Vulnerability (lien direct) |
Researchers discovered a flaw in the ASN1C compiler produced by Objective Systems, Inc. It could lead to a dangerous network vulnerability.
|
Guideline
|
|
|
|
2016-10-07 12:54:33 |
National Cyber Security Awareness Month: Attestations and Certifications (lien direct) |
This National Cyber Security Awareness Month, security leaders should examine their IT environments with respect to SSAE-16 and ISO 27001 standards.
|
Guideline
|
|
|
|
2016-09-30 13:25:16 |
Pros and Cons of Building and Maintaining In-House Pen Testing Capability (lien direct) |
Security leaders must weigh the convenience and speed of in-house pen testing against the cost of maintaining a team to conduct security tests.
|
Guideline
|
|
|
|
2016-09-12 14:50:15 |
The CASB Knows: Lifting the Cloud App Visibility Fog (lien direct) |
A cloud access security broker (CASB) can help security leaders manage the use of cloud-based apps to benefit both the enterprise and its employees.
|
Guideline
|
|
|
|
2016-09-08 14:00:29 |
IBM Named a Leader in 2016 Forrester Wave for Managed Security Services (lien direct) |
IBM Security is among those that lead the pack in a recent assessment of 11 providers in "The Forrester Wave for Managed Security Services, Q3 2016."
|
Guideline
|
|
|
|
2016-09-05 13:25:28 |
Why Should Women in Security Shoot for the Stars? (lien direct) |
In response to the dearth of women in security, IBM is leading an industrywide push to encourage and enable women to pursue cybersecurity careers.
|
Guideline
|
|
|
|
2016-08-29 11:00:25 |
Five Signs of Identity Governance Trouble (lien direct) |
Security leaders can manage their organization's risk by identifying and remediating identity governance trouble before it leads to a damaging data breach.
|
Guideline
|
|
|
|
2016-08-26 11:35:23 |
Security Conferences Abound: Which Should You Attend? (lien direct) |
Security leaders, professionals and operational business leaders all stand to benefit from the myriad security conferences being held in 2017.
|
Guideline
|
|
|
|
2016-08-22 15:00:25 |
Innovation Fuels IBM QRadar Leadership (Again) in Gartner\'s 2016 Magic Quadrant for SIEM (lien direct) |
IBM QRadar is a leader again in the 2016 Gartner Magic Quadrant for SIEM, further cementing its reputation as a top security solution.
|
Guideline
|
|
|
|
2016-07-12 11:51:15 |
The Information Security Leader, Part 2: Two Distinct Roles of a CISO (lien direct) |
Information security leaders today must be able to fill the two distinct roles of a CISO: the subject-matter expert and the trusted business adviser. |
Guideline
|
|
|
|
2016-07-07 09:36:10 |
After the Brexit: Three New Challenges Facing European Security Leaders (lien direct) |
Now that the U.K. has voted in favor of the Brexit, security leaders across Europe will have to handle a few new challenges stemming from the move. |
Guideline
|
|
|
|
2016-07-05 12:56:08 |
The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges (lien direct) |
An information security leader today needs to fill multiple roles and be capable of addressing new challenges related to managing risk. |
Guideline
|
|
|
|
2016-06-03 10:21:03 |
Inside the Mind of a Hacker: Attacking the Memory (lien direct) |
A savvy hacker may identify vulnerabilities that lead to memory attacks. Learn what contributes to these issues and best practices for avoiding them. |
Guideline
|
|
|
|
2016-05-03 18:55:50 |
Bank Teller or Robber? Analytics, Predictive Insight and Agility Can Stop Data Breaches Before They Begin (lien direct) |
Are insiders leading to data breaches within your organization? The right security tools and analytics can help you find out — and prevent these incidents. |
Guideline
|
|
|
|
2016-04-27 10:05:49 |
Engaging Conversations Key to Improving Cyber Risk Decisions (lien direct) |
C-level executives, boards of directors and security leadership need to have engaging conversations to make better cyber risk decisions for the business. |
Guideline
|
|
|