What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2016-12-16 13:31:25 2016: The Year of the DDoS Attack (lien direct) In 2016, the year of the DDoS attack, cybercriminals hijacked millions of IoT devices to create massive botnets they used to take down popular websites.
securityintelligence.webp 2016-12-16 13:00:24 10 Application Security Testing Resources You Should Master and Share With Your Executive Team in 2017 (lien direct) IT managers should review, master and share these 10 application security testing resources to stay ahead of the rapidly evolving threat landscape in 2017.
securityintelligence.webp 2016-12-16 10:30:22 GDPR Compliance Regulations: The New Challenge for the Cloud Operations Manager (lien direct) Companies around the world must review the processes by which they collect and store personal data to prepare for the upcoming GDPR compliance regulations. ★★
securityintelligence.webp 2016-12-15 16:15:21 Employ Enterprise Security Collaboration to Blunt Cyber Risks (lien direct) Enterprise security collaboration is critical to protecting valuable business data. IT managers should consult executives and train them on cyberthreats.
securityintelligence.webp 2016-12-15 13:25:19 Fighting Advanced Ransomware Attacks Requires Game-Changing Technology (lien direct) As ransomware attacks become more advanced, Resilient's Dynamic Playbooks enable IT professionals to more effectively prepare for and respond to incidents.
securityintelligence.webp 2016-12-15 12:00:23 Insider Threats, Industrial Sabotage and Game Theory, Part 3: Multiplayer Games (lien direct) Organizations seeking to prevent insider threats should establish red, blue and black teams to produce threat models for multiplayer games.
securityintelligence.webp 2016-12-14 22:05:19 Turn Scrap Paper Into Security Investigations With IBM X-Force Threat Intelligence (lien direct) IBM added a Collections feature to its X-Force Exchange that enables researchers to share reports and engage in collaborative defense.
securityintelligence.webp 2016-12-14 13:50:21 Five Signs of CISO Complacency (lien direct) CISO complacency can lead to anxiety and ambiguity, which can erode team morale and cause IT departments to miss important details with no accountability. Guideline
securityintelligence.webp 2016-12-14 13:10:22 How Can You Quantify the Value of Web Access Enforcement? (lien direct) Each business is responsible for establishing its own system for evaluating web access enforcement based on the particular needs of the organization.
securityintelligence.webp 2016-12-14 11:00:23 Ransomware Report: Top Security Threat Expected to Continue Rising in 2017 (lien direct) To pay or not to pay? When it comes to ransomware, that is the question. Despite a rise in attacks, organizations are largely unaware of the threat.
securityintelligence.webp 2016-12-13 22:00:24 Nǐ Hǎo TrickBot? Dyre Successor Spreads to Asia (lien direct) The cybergang behind the TrickBot Trojan has moved into Singapore, targeting the many multinational corporations that operate in the region.
securityintelligence.webp 2016-12-13 12:35:23 Flying With the Wind: Reduce Drag on Your Data Protection Program With Automation and Visualization (lien direct) Automation and analytics can help IT professionals speed up and solidify their data protection programs and prepare for regulatory audits.
securityintelligence.webp 2016-12-13 11:55:18 Making a SIEM Dance With Docker (lien direct) IBM added Docker containerization technology to its QRadar SIEM platform to provide the agility, stability and robustness needed to fight evolving threats.
securityintelligence.webp 2016-12-12 13:15:22 Secure Your IoT Deployment by Paying Attention to These Four Factors (lien direct) It has never been more important to secure your IoT deployment. Challenges include lack of visibility, inexperience and the IoT's increasing complexity.
securityintelligence.webp 2016-12-12 12:10:21 Is Bluetooth Security Good Enough for Your Most Sensitive Corporate Communications? (lien direct) Bluetooth security is not strong enough to keep fraudsters from eavesdropping on sensitive communications. The upcoming Bluetooth 5 offers enhancements.
securityintelligence.webp 2016-12-12 11:35:19 With AI2, Machine Learning and Analysts Come Together to Impress, Part 2: The Algorithms (lien direct) AI2 uses an "analyst-in-the-loop" system to improve itself and a "human-in-the-loop" system to create examples to be used in iterative training algorithms.
securityintelligence.webp 2016-12-09 14:20:20 Avoiding Threat Management Rookie Mistakes (lien direct) Two recent cyberattacks against global companies and services demonstrated the need for better threat management practices and awareness. ★★★
securityintelligence.webp 2016-12-09 13:00:39 Augmented Intelligence: Making the Case for Cognitive Security (lien direct) Augmented intelligence solutions enable security analysts to examine previously unthinkable amounts of data with the helps of cognitive technology.
securityintelligence.webp 2016-12-09 12:15:18 The U.S. Federal CISO and His First 100 Days (lien direct) The new federal CISO will work with organizations and advocates in the government and private sectors to devise an overarching U.S. cybersecurity strategy.
securityintelligence.webp 2016-12-08 16:40:19 Save Time by Accessing Multiple Threat Intelligence Streams at Once (lien direct) IBM created an external threat feed manager to work with the threat intelligence services and partnerships available in the X-Force Exchange.
securityintelligence.webp 2016-12-08 12:55:17 How to Find and Remediate Vulnerabilities in Real Time (lien direct) IT managers should take advantage of the many resources available to help them monitor, manage and ultimately remediate vulnerabilities.
securityintelligence.webp 2016-12-08 11:40:19 Behind the Scenes at a Capture the Flag (CTF) Competition (lien direct) A CTF competition can help an IT expert, student or budding cybersecurity enthusiast develop new skills and knowledge in a safe, competitive environment.
securityintelligence.webp 2016-12-07 13:30:22 For Science! Steps for Safe Volunteer Computing (lien direct) The old adage that "time is money" is proven once again when it comes to volunteer computing. Here's what you need to know before signing onto a project.
securityintelligence.webp 2016-12-07 13:00:36 Rising Attack Rates and Massive Breaches Plague Government Organizations (lien direct) IBM's "2016 Cyber Security Intelligence Index" reported that the government sector is now the fourth most frequently targeted industry in the U.S.
securityintelligence.webp 2016-12-07 11:35:17 Stranger Than Fiction? The Six Weirdest 2016 Data Breaches (lien direct) The list of notable 2016 data breaches is long and wacky. Cybercriminals compromised food delivery apps, FBI databases and seemingly everything in between.
securityintelligence.webp 2016-12-06 13:20:25 Pivoting Toward Cognitive Security: Benefits and Challenges (lien direct) Many organizations are adopting cognitive security solutions to boost response speed, security intelligence and accuracy, while others are lagging behind.
securityintelligence.webp 2016-12-06 12:40:18 Real-Time Payments, Real-Time Fraud Risks? (lien direct) Programs such as NACHA's Faster Payments initiative may help U.S. businesses become more competitive, but shorter transaction times lead to fraud risks. Guideline
securityintelligence.webp 2016-12-06 10:35:17 Best Practices for Selecting a Managed Security Services Provider for Organizations in Asia-Pacific (lien direct) As IT managers in Asia-Pacific continue to struggle with a skills gap, it's more critical than ever to choose the right managed security services provider.
securityintelligence.webp 2016-12-05 13:45:18 Security Starts With People: Three Steps to Build a Strong Insider Threat Protection Program (lien direct) To protect their organizations from an insider threat, IT managers should take steps to reduce exposure of data and enhance detection capabilities.
securityintelligence.webp 2016-12-05 13:00:21 The Power of Network Insights: Nowhere for Threats to Hide (lien direct) IBM QRadar Network Insights enables security professionals to analyze historical threat data and identify indicators of malicious activity in real time.
securityintelligence.webp 2016-12-05 12:25:17 With AI2, Machine Learning and Analysts Come Together to Impress, Part 1: An Introduction (lien direct) Machine learning systems like A12 are designed to augment human analysis with cognitive intelligence, enabling IT professionals to reduce false positives.
securityintelligence.webp 2016-12-02 13:35:19 The Threat Model of 2017 (lien direct) If a threat model assumes a system is operating within certain parameters, changes in the threat environment could trigger unintended second-order effects.
securityintelligence.webp 2016-12-02 13:35:16 Is Your Security Intelligence Solution Stuck in the Past? (lien direct) IT security managers should bet on a security intelligence solution that can be installed quickly and offers speedy, reliable support.
securityintelligence.webp 2016-12-02 12:00:24 Detect Endpoint Threats by Analyzing Process Logs in QRadar (lien direct) Using an SIEM solution such as QRadar, security professionals can analyze process logs to detect, hunt and trace the source of threats.
securityintelligence.webp 2016-12-01 13:00:21 Mirai Evolving: New Attack Reveals Use of Port 7547 (lien direct) Cybercriminals recently discovered how to modify the Mirai botnet source code, which leaked in September, to compromise devices remotely via TCP port 7547.
securityintelligence.webp 2016-12-01 12:05:16 MSS Offerings: Looking Under the Hood (lien direct) IT managers should consider a provider's quality of SOC staffing, flexibility and ability to meet business objectives when comparing MSS offerings.
securityintelligence.webp 2016-12-01 09:00:18 Don\'t Blink! TrickBot Now Targets 10 German Savings Banks (lien direct) IBM X-Force researchers reported that the TrickBot banking Trojan added new attack capabilities designed to target savings banks in Germany.
securityintelligence.webp 2016-11-30 14:25:15 Five Cybersecurity Challenges Facing Financial Services Organizations Today (lien direct) Financial services companies faces a growing number of evolving cybersecurity challenges, including countless regulations and rising customer expectations.
securityintelligence.webp 2016-11-30 13:00:22 Hello, You\'ve Been Compromised: Upward Attack Trend Targeting VoIP Protocol SIP (lien direct) According to IBM Managed Security Services data, cybercriminals most commonly target the SIP and SCCP protocols in VOIP spam attacks.
securityintelligence.webp 2016-11-30 11:05:15 Cybersecurity Meets Gamification at CTF Competitions (lien direct) CTF competitions offer a closed arena for IT amateurs and experts to build and exercise their cybersecurity skills - and have a little fun along the way.
securityintelligence.webp 2016-11-29 13:00:20 Security Starts With People: Know Who They Are, Know What They Do (lien direct) Technology is great, but security starts with people. The best way to prevent a data breach is to know the people in your organization and what they do.
securityintelligence.webp 2016-11-29 12:10:18 Cognitive Security Key to Addressing Intelligence and Accuracy Gaps (lien direct) Cybersecurity leaders hope to use cognitive security solutions to improve detection and incident response capabilities and reduce false positives. Guideline
securityintelligence.webp 2016-11-29 07:30:18 Where Are We on Cybersecurity in India? (lien direct) The state of cybersecurity in India has been shaky during the country's rapid digitization, but companies are learning how to better prepare for incidents.
securityintelligence.webp 2016-11-28 15:20:18 Don\'t Fall for an Imperfect Data Security Solution (lien direct) Organizations that fall for hollow sales pitches for imperfect data security solutions risk leaving their valuable assets vulnerable to cybertheft.
securityintelligence.webp 2016-11-28 12:40:16 Access Management Resolution in the Digital Era (lien direct) As organizations continue to embrace the digital era and cloud services, it's more important than ever to find an access management resolution.
securityintelligence.webp 2016-11-28 10:35:16 In 2017, Blockchain Gets Serious (lien direct) Formerly only associated with cryptocurrencies such as Bitcoin, blockchain technology will come of age in 2017, yielding use cases across industries.
securityintelligence.webp 2016-11-23 16:30:18 TrickBot Redirection Attacks Launched in Canada (lien direct) TrickBot has developed new attack methods specifically designed to target banks in Canada in addition to its established targets in the U.K. and Australia.
securityintelligence.webp 2016-11-23 13:10:21 \'In Security\' Web Comic, Episode 003: To the Command Center (lien direct) The Every App team visits the IBM X-Force Command Center to see what can be done about Pandapocalypse. Can the Cyber Range help improve their response?
securityintelligence.webp 2016-11-23 12:30:16 IT and Business Leaders Collaborate to Protect Critical Data (lien direct) It takes a collaborative effort between IT and business leaders to protect critical data from cybercriminals and sustain a competitive advantage. Guideline
securityintelligence.webp 2016-11-23 11:45:15 Travel Security Tips for Personal and Business Trips (lien direct) Before leaving for a business trip, be sure to keep these basic travel security tips in mind to keep your data safe from local adversaries.
Last update at: 2024-07-16 04:08:13
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter