What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2019-11-18 12:00:23 Shifting From Ransomware Detection to Prevention (lien direct) While prevention is no easy feat, there are steps that can reduce the risk of opportunistic ransomware attacks, including running backups and embedding threat intelligence. Ransomware Threat
securityintelligence.webp 2019-11-18 11:00:21 Change the Security Conversation to Help Advance Your Business (lien direct) By changing the cultural definition and conversation around security, business leaders can better reduce complexity in security ecosystems, orchestrate security responses and embrace open source. Guideline
securityintelligence.webp 2019-11-14 13:20:27 Let\'s Recruit and Retain More Women in the Cybersecurity Industry (lien direct) The cybersecurity industry is still facing a serious numbers problem as many jobs go unfilled. What if many of the most troubling issues could be improved by having more women in cybersecurity?
securityintelligence.webp 2019-11-14 11:30:25 Data Privacy in the Modern Workplace (lien direct) News of privacy-related fines and investigations have led many businesses to scramble to achieve compliance and protect customer data. However, many fail to consider their employees' data privacy.
securityintelligence.webp 2019-11-13 11:45:21 The Principle of Least Privilege Makes Total Sense, But How Do You Put It to Work? (lien direct) The principle of least privilege can create balance between security, risk and productivity. The benefits are clear, but how can you adopt this approach to identity and access management?
securityintelligence.webp 2019-11-13 11:16:13 Why It\'s Time to Adopt IoT Security by Design (lien direct) We encounter the IoT in myriad forms as we go about our daily routine, from sensors to smart vehicles, which is why businesses and manufacturers need to work together to adopt IoT security by design.
securityintelligence.webp 2019-11-12 14:00:38 How to Protect Your Organization From Evolving Phishing Attacks (lien direct) Protecting against evolving phishing attacks requires robust security awareness training for users and some help from technologies like artificial intelligence and ahead-of-threat detection.
securityintelligence.webp 2019-11-12 12:30:26 What Are Insider Threats and How Can You Mitigate Them? (lien direct) There are several types of insider threats that organizations should be aware of and each presents different symptoms for security teams to diagnose.
securityintelligence.webp 2019-11-11 14:01:09 10 Differences Between Digital Transformation Leaders and Laggards (lien direct) Research shows that there are many differences between the best-of-class enterprises leading the way in digital transformation and their peers, who are falling behind. Guideline
securityintelligence.webp 2019-11-08 14:10:25 10 Myths and Misconceptions About Industrial Espionage (lien direct) Industrial espionage is real, it's common, and it can be very costly for your organization. Don't fall for the myths around this serious issue. Start preparing for the threat today. Threat
securityintelligence.webp 2019-11-07 13:35:21 How to Start Building an Insider Threat Program (lien direct) Sometimes it only takes one moment, one life-changing incident, to turn the most trustworthy employee into an insider threat. Threat ★★★
securityintelligence.webp 2019-11-07 11:30:25 You Don\'t Know What You Don\'t Know: 5 Best Practices for Data Discovery and Classification (lien direct) These five best practices can help you develop effective data discovery and classification processes, which are foundational pillars of any data protection strategy.
securityintelligence.webp 2019-11-06 12:30:25 Measure and Improve the Maturity of Your Incident Response Team (lien direct) Incident response and management requires continual growth. Your team will not become proficient overnight.
securityintelligence.webp 2019-11-06 11:00:27 Smarter Devices, Smarter Fraud: Overlooked Threats in IoT Security (lien direct) Many manufacturers of connected devices fail to recognize the IoT security implications of customers tinkering with their products.
securityintelligence.webp 2019-11-05 14:20:27 Machine Learning: With Great Power Come New Security Vulnerabilities (lien direct) Understanding the basic vulnerabilities and prevention tactics associated with machine learning is the first step toward combating these emerging threats.
securityintelligence.webp 2019-11-04 12:45:21 Security Supply and Demand: An Economic Approach to Cybersecurity Risk Management (lien direct) Effective cybersecurity risk management boosts infosec supply and reduces cost demands, but it isn't a purely technological venture. Here's how economic theory can help reduce total risk.
securityintelligence.webp 2019-11-04 12:00:24 Data Discovery and Classification Are Complicated, But Critical to Your Data Protection Program (lien direct) Given the myriad strategic, tactical, business and technical reasons for performing data discovery and classification, why isn't it part of every company's data protection program?
securityintelligence.webp 2019-10-30 13:00:49 How PR Teams Can Prepare for Data Breach Risks With Incident Response Planning (lien direct) Like your incident response team, the PR team needs to understand data breach risks, prepare with communication templates, processes, and tooling and be part of your incident response plan. Data Breach
securityintelligence.webp 2019-10-30 11:15:30 Are Cybercriminals Winning the Mainframe Security Cat-and-Mouse Game? (lien direct) The current state of mainframe security often amounts to bringing a knife to a gun fight: The number of available fighters is shrinking as skilled mainframe security practitioners hang up their hats.
securityintelligence.webp 2019-10-28 10:45:22 Does Social Media Visualization Serve as a Primer for 5G Data Visualization? (lien direct) The deployment of 5G data technology in our daily lives will burden cybersecurity management teams and create an entirely new set of risk issues that must be handled.
securityintelligence.webp 2019-10-25 12:00:24 Keep Adversaries at Bay With the MITRE ATT&CK Framework (lien direct) Organizations are adopting the MITRE ATT&CK framework to map their cybersecurity threat detection, prevention and response capabilities to attack scenarios. Threat
securityintelligence.webp 2019-10-24 14:50:22 A Threat Intelligence Strategy Map: Connecting Technical Activities to Business Value (lien direct) Despite ever-growing investments in security tools, the risk of a data breach remains unacceptably high. This is the starting point of a strong a business case for investing in threat intelligence. Data Breach Threat
securityintelligence.webp 2019-10-24 13:30:23 How to Explain Cybersecurity and Improve User Behavior at the Same Time (lien direct) Knowing how to explain cybersecurity means focusing on what the asker already knows and their frame of reference so we can adapt our explanations to fit their knowledge.
securityintelligence.webp 2019-10-23 20:00:28 Breaking Down Gartner\'s 2019 Critical Capabilities for Unified Endpoint Management (UEM) Tools (lien direct) In its "2019 Critical Capabilities for Unified Endpoint Management (UEM) Tools" report, Gartner identified MaaS360 as a vendor that provides in-depth support for all four critical capabilities.
securityintelligence.webp 2019-10-23 13:25:21 How Can Airlines Protect Their Customers and Data From Evolving Cyberthreats? (lien direct) Today, the cyberthreats that pose the greatest risk to the airline industry include financially motivated attackers seeking to compromise customer data.
securityintelligence.webp 2019-10-22 13:00:38 How to Secure Wi-Fi and Improve Personal and Enterprise Security From Home (lien direct) Technology has enabled employees to work from the office, from home and pretty much everywhere in between. Unfortunately, many employees still aren't connecting to secure Wi-Fi, putting data at risk.
securityintelligence.webp 2019-10-22 11:15:21 Credential-Stuffing Attacks Are Just the Tip of the Iceberg (lien direct) Credential-stuffing attacks are indicative of the much larger issue of account takeover. Adaptive authentication can help improve the digital experience for low-risk users.
securityintelligence.webp 2019-10-22 10:30:24 3 Key Questions to Help Address Enterprise IoT Security Risks (lien direct) Enterprises are adopting IoT devices to improve efficiency and deliver truly memorable and competitive experiences. With this influx of connected devices comes a host of new IoT security risks.
securityintelligence.webp 2019-10-21 12:05:22 How to Make Cryptography Services Work for Your Organization (lien direct) Organizations consider certificate management and key management a commodity, and many seem to struggle to get this right. However, there's more to cryptography than encryption, keys and certificates.
securityintelligence.webp 2019-10-21 10:30:23 Does Your Security Awareness Program Put People First? (lien direct) If people are the most important element of cybersecurity, why do many security awareness training programs fail to deliver the expected results?
securityintelligence.webp 2019-10-18 17:00:22 (Déjà vu) Identity Analytics and the \'2019 Gartner Magic Quadrant for Identity Governance and Administration\' (lien direct) IBM was named a Leader in the "2019 Gartner Magic Quadrant for Identity Governance and Administration" for its ability to execute and completeness of vision. Guideline
securityintelligence.webp 2019-10-18 11:00:24 Stay Calm, Your Incident Response Is Ready (lien direct) Incident communication is a crucial part of incident response. Pre-planning your communication strategy and escalation paths can help your response team stay calm during a crisis.
securityintelligence.webp 2019-10-17 13:40:22 How to Tell Safe Advertisements From Dangerous Malvertising (lien direct) With malvertising on the rise, how can users and organizations tell the difference between safe advertisements and malicious ones that threaten personal or company data?
securityintelligence.webp 2019-10-16 12:00:23 Will the Future of Authentication Run Into a Privacy Wall? (lien direct) Digital identify, technological innovation, authentication and data privacy issues are not aligned. This impacts how we handle relationships and business. Policy issues must be resolved.
securityintelligence.webp 2019-10-16 11:15:22 5 Must-Haves for Your Next Managed Security Services Provider (MSSP) (lien direct) With a modern managed security services provider (MSSP), organizations can gain the specialized skills needed to cost-effectively protect against the increasing range, volume and severity of threats.
securityintelligence.webp 2019-10-16 10:00:24 10 Reasons Your Organization Is Potentially at Risk of a Ransomware Attack (lien direct) With ransomware attacks attempted every 14 seconds, security teams understand that readiness and response capabilities are critical. Prepare your organization against these 10 common security gaps. Ransomware
securityintelligence.webp 2019-10-15 11:45:28 How Authentication and Identification Work Together to Build Digital Trust (lien direct) Building trust in an online or mobile user requires both identification and authentication.
securityintelligence.webp 2019-10-15 11:00:23 11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget (lien direct) A bigger cybersecurity budget is a tool to address security risks, business needs and industry changes. Here are 11 statistics on CISO spending to help inform your 2020 cybersecurity budget. Tool
securityintelligence.webp 2019-10-15 10:00:22 The Day MegaCortex Ransomware Mayhem Was Averted (lien direct) IBM X-Force IRIS investigated a recent MegaCortex ransomware attack that highlights the benefits of reporting early and escalating suspicious indicators to responders. Ransomware
securityintelligence.webp 2019-10-14 15:00:23 What Cybersecurity Professionals Do Versus What Our Coworkers Think We Do (lien direct) People's understanding of what cybersecurity professionals do often bears little resemblance to the reality of what we actually do, but there are things you can and should do to correct this.
securityintelligence.webp 2019-10-11 14:00:34 How Cybersecurity Salaries Fit Experience and Specialization (lien direct) Not too long ago, there was a one-size-fits-all assumption about cybersecurity jobs. Today, jobs are more specialized - with higher cybersecurity salaries to match.
securityintelligence.webp 2019-10-10 10:00:39 Clone or Swap? SIM Card Vulnerabilities to Reckon With (lien direct) SIM card vulnerabilities leave organizations exposed to SIM swapping and SIM cloning attacks. IBM X-Force findings from dark web analysis suggest these threats are not slowing down anytime soon.
securityintelligence.webp 2019-10-10 10:00:22 Why Cities Shouldn\'t Pay Ransomware Criminals (lien direct) Recent ransomware attacks on U.S. cities have revealed the exorbitant cost of recovering from a data breach. However, paying the ransom only empowers cybercriminals to continue their campaigns. Ransomware
securityintelligence.webp 2019-10-09 13:45:22 Practice Social Media Safety to Protect Both Personal and Enterprise Data (lien direct) When it comes to social media safety, users are often unaware of the ramifications of their online posts. Many don't realize they may be putting personal and even enterprise data at risk.
securityintelligence.webp 2019-10-08 11:00:35 Why a Cybersecurity Assessment Needs to Be Part of Your M&A Due Diligence Checklist (lien direct) Failing to include a cybersecurity assessment on your merger and acquisition (M&A) due diligence checklist means risking a data breach - and potentially shaving millions off the price of the deal. Data Breach
securityintelligence.webp 2019-10-08 11:00:22 How Will 5G Deployment Impact Smart Cities? (lien direct) There's no doubt that 5G deployment is going to be a game changer for smart cities. But anything that is going to generate data in ways we've not seen before is going to create cybersecurity concerns.
securityintelligence.webp 2019-10-07 13:45:21 Why Zero Trust Is Critical to a Productive Mobile Workforce (lien direct) Businesses undergoing digital transformation are adopting the zero trust model to help manage the flow of corporate data to mobile devices.
securityintelligence.webp 2019-10-04 16:55:19 10 Do\'s and Don\'ts for Writing a Winning Cybersecurity Resume (lien direct) You can land a job in cybersecurity even if you didn't study it. Here are 10 do's and don'ts for writing a winning cybersecurity resume, even if you're not a traditionally qualified candidate.
securityintelligence.webp 2019-10-03 11:30:24 When Digital Identity and Access Management Meets Physical Security (lien direct) If your identity and access management (IAM) and physical security initiatives are not working as one, your organization may be suffering from unnecessary grief - and increasing risk.
securityintelligence.webp 2019-10-03 10:00:24 Ramnit Targets Japanese Shoppers, Aiming at Top Fashion Brands (lien direct) In a recent analysis of Ramnit Trojan targets, IBM X-Force looked into the way the malware's operators target e-commerce vendors in Japan - the gang's active attack turf nowadays.
Last update at: 2024-06-26 10:07:54
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter