What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2017-07-27 11:30:25 After Big Takedown Efforts, 20 More BankBot Mobile Malware Apps Make It Into Google Play (lien direct) IBM X-Force researchers discovered 20 apps in the Google Play Store that deliver mobile malware to unsuspecting Android users.
securityintelligence.webp 2017-07-26 13:30:18 Estonia to Build Off-Site Data Center in Luxembourg (lien direct) Pending negotiations with Luxembourg, Estonia will become the first nation to build an off-site data center in another country.
securityintelligence.webp 2017-07-26 11:15:17 Psychological Security: Helping Your Team Think Like Cybercriminals (lien direct) Psychological security refers to the notion that to defend a network against threats, security professionals must be able to think like cybercriminals.
securityintelligence.webp 2017-07-25 12:35:15 The Evolution of Digital Certificates (lien direct) Digital certificates are used to authenticate both sides of a browser connection. It's a good first step, but certificates do not assure absolute trust.
securityintelligence.webp 2017-07-25 11:50:16 Cybercrime Awareness Should Be Fun (lien direct) Cybercrime awareness training is too crucial to be glossed over during onboarding or quickly rehashed at the end of the year.
securityintelligence.webp 2017-07-25 11:05:15 Administrator Credentials: A Security Breach Waiting to Happen (lien direct) If access is not properly secured, cybercriminals can use weak administrator credentials to take control over corporate networks.
securityintelligence.webp 2017-07-24 14:45:16 Multipronged IoT Security to Help Realize the Value of IoT Solutions (lien direct) IT decision-makers should invest in reliable tools and the help of trusted experts to respond to emerging IoT security challenges.
securityintelligence.webp 2017-07-24 13:00:16 IBM X-Force Red Turns 1, Expands Into Auto and IoT Practice Areas (lien direct) Today IBM X-Force Red launches a collaboration with the Watson IoT Platform to help ensure that all IoT solutions get our special brand of hacker love.
securityintelligence.webp 2017-07-24 11:20:17 Who Is Responsible for Cloud Security? (lien direct) Cloud security must be a team effort between providers and customers. The distribution of responsibility depends on the cloud model.
securityintelligence.webp 2017-07-21 13:10:16 Getting the Most Out of Black Hat (lien direct) The Black Hat conference offers a chance to network and glean insights from experts that can change the way you think about security.
securityintelligence.webp 2017-07-21 12:05:13 Employee Education Is the Key to Enhanced Protection for Energy Companies (lien direct) The U.S. energy infrastructure requires enhanced protection, and CISOs must educate their employees about security risks to those critical assets.
securityintelligence.webp 2017-07-20 13:10:26 The Living Dead: How to Protect Legacy Systems (lien direct) When patching legacy systems is simply not an option, security teams must take steps to minimize the risks associated with outdated software.
securityintelligence.webp 2017-07-20 11:55:13 Cloud Security Is Not an Either/Or (lien direct) Cloud security is neither a magic bullet for analysts, nor a particularly vulnerable target for cybercriminals. It all depends on the effort you put in.
securityintelligence.webp 2017-07-19 11:45:26 TrickBot Habla Español: Trojan Widens Its Attack Scope in Spain, Brings Redirection Attacks to Local Banks (lien direct) The TrickBot Trojan has been steadily ramping up its activity this year, going into a rather intensive period of updates and attacks that started in Q2.
securityintelligence.webp 2017-07-19 11:10:28 Monitor Your Network for NotPetya in Real Time (lien direct) With the QRadar NotPetya Content Pack, security analysts can monitor their networks for indicators of NotPetya ransomware in real time. NotPetya
securityintelligence.webp 2017-07-18 13:10:28 Connecting Fintech Security Perceptions to Reality (lien direct) The state of fintech security will fluctuate based on the industry's ability to maintain regulatory compliance and stay abreast of cybercrime trends.
securityintelligence.webp 2017-07-18 12:00:30 Uncover Omnichannel Fraud Faster (lien direct) With so many ways to connect with banks today, financial organizations need omnichannel fraud detection tools to distinguish customers from fraudsters.
securityintelligence.webp 2017-07-18 10:45:26 Responsive Machine Learning: The Necessary Evolution of Endpoint Security (lien direct) With responsive machine learning, analysts can create robust training sets by combining thousands of malware samples with current data on software updates.
securityintelligence.webp 2017-07-17 12:10:28 Top Cybersecurity Trends for the First Half of 2017 (lien direct) Many of the most notable cybersecurity trends of the first half of 2017, such as the rapid evolution of malware techniques, will continue through the year.
securityintelligence.webp 2017-07-17 12:00:44 Achieve the Ultimate Data Protection for Your Trusted Digital Experience (lien direct) IBM z14 provides pervasive encryption capabilities to help organizations improve data protection and maintain regulatory compliance.
securityintelligence.webp 2017-07-17 11:10:27 How Virus Protection Software Has Evolved With the Threat Landscape (lien direct) Virus protection software has come a long way in the past 30 years, and the advent of machine learning represents a bright future for malware fighters.
securityintelligence.webp 2017-07-14 13:25:23 The Limits of Linguistic Analysis for Security Attribution (lien direct) Linguistic analysis can provide clues to help security analysts trace the source of a cyberattack, but the method is inconclusive on its own.
securityintelligence.webp 2017-07-14 13:20:26 The 21st-Century Real Estate Deal: How the Internet of Things Is Changing Commercial Real Estate (lien direct) The Internet of Things is disrupting the real estate industry, requiring brokers to develop new skills to help clients maximize their investments.
securityintelligence.webp 2017-07-13 11:55:22 Half-Year Roundup: The Top Five Data Breaches of 2017 - So Far (lien direct) Organizations around the world and across industries have had to deal with more than their fair share of devastating data breaches so far in 2017.
securityintelligence.webp 2017-07-13 11:05:24 Is Blockchain the Key to Stopping Ransomware Attacks? (lien direct) Since bitcoin conversions are processed on a blockchain, security analysts can trace transactions to determine the root cause of a ransomware attack.
securityintelligence.webp 2017-07-12 12:10:26 Preventative Medicine: Get a Health Check for Your SIEM (lien direct) Like the human body, security information and event management (SIEM) solutions require regular checkups to maintain optimal functionality.
securityintelligence.webp 2017-07-12 11:15:24 Outsider or Insider: Who Will Cause Today\'s Data Breach? (lien direct) Security leaders must defend sensitive enterprise information from both external actors and negligent insiders who might accidentally cause a data breach. Guideline
securityintelligence.webp 2017-07-11 12:00:32 The Promise of a Unified App Catalog for the Enterprise (lien direct) A unified app catalog can help IT leaders properly manage the mobile workforce and secure disparate applications running on different operating systems. Guideline ★★★★
securityintelligence.webp 2017-07-11 11:10:26 The Internet of Things to Come in Cybersecurity (lien direct) The Internet of Things offers convenience and fun in the form of step counters and other innovative toys, but it also puts health data and PII at risk.
securityintelligence.webp 2017-07-10 12:00:27 Information and Communication Technology (ICT) Industry: Second-Most Attacked Sector in 2016 (lien direct) The information and communication technology (ICT) industry suffered the second-most attacks out of all sectors monitored by IBM X-Force in 2016. ★★
securityintelligence.webp 2017-07-10 11:25:21 A Primer on Cross-Site Scripting (XSS) (lien direct) XSS is a prevalent web-based exploit in which threat actors inject malicious code into webpages to compromise data or facilitate phishing scams.
securityintelligence.webp 2017-07-10 10:15:25 Companies Around the World are Ramping Up for the GDPR - Is Yours? (lien direct) The General Data Protection Regulation (GDPR) will take effect on May 25, 2018, and companies that fail to prepare may face steep fines. ★★★★★
securityintelligence.webp 2017-07-07 11:10:23 The Cybersecurity Skills Gap Is No Match for Cognitive Security (lien direct) Cognitive security tools enable SOC analysts to bridge gaps in intelligence, speed and accuracy, and empowers team leaders to address the IT skills gap. Guideline
securityintelligence.webp 2017-07-07 09:45:22 Can You Guess the Cost of a Data Breach in the Asia-Pacific? (lien direct) The rapid expansion of the Asia-Pacific economy is presenting new cybersecurity challenges and driving up the cost of a data breach in the region.
securityintelligence.webp 2017-07-06 11:55:37 Using SIEM Solutions to Connect the Security Dots and Detect Ransomware (lien direct) Security tools can only provide so much value in isolation. An SIEM platform helps analysts connect the dots between data produced by disparate solutions. ★★
securityintelligence.webp 2017-07-06 11:05:21 Succession Planning: The Importance of a Deputy CISO (lien direct) To ensure a smooth transfer of security power, organizations should establish a definitive plan to appoint and develop a deputy CISO.
securityintelligence.webp 2017-07-05 11:45:20 Spot (and Remedy) the Rotten Apple Before It Spoils the SIEM Barrel (lien direct) It can be hard to determine false alarm security events with SIEM solutions. Through IBM's new partnership with AlgoSec, your team has a new tool to help.
securityintelligence.webp 2017-07-05 10:20:22 Current Trends in Identity and Access Management: July 2017 (lien direct) At the midpoint of 2017, five trends are emerging in the identity and access management, and with these waves comes an opportunity for security teams.
securityintelligence.webp 2017-07-03 11:40:20 Going Through a Rough Patch in Your Security Program? Consistent Software Patching Can Solve Security Woes (lien direct) Effective and consistent software patching can solve the majority of common security challenges, yet many organizations struggle with patch management.
securityintelligence.webp 2017-07-03 11:00:21 The Emergence of Virtual Reality and Augmented Reality in the Security Operations Center (lien direct) New technologies like augmented and virtual reality may be the next big thing for security operations centers. ★★★★
securityintelligence.webp 2017-06-30 14:35:19 SD-WAN: Improve Security and Reduce Cost While Complying with Payment Card Industry Standards (lien direct) SD-WAN technologies are transforming the way enterprise retailers approach connectivity and implementation of security functions at branch locations.
securityintelligence.webp 2017-06-30 11:15:19 The XX Factor: The Critical Role of Women in Closing the Cybersecurity Skills Gap (lien direct) With 1.8 million IT positions set to go unfilled by 2022, closing the industry's gender gap can go a long way toward closing the cybersecurity skills gap.
securityintelligence.webp 2017-06-29 20:30:21 A \'Wiper\' in Ransomware Clothing: Global Attacks Intended for Destruction Versus Financial Gain (lien direct) Further analysis of impacted Petya ransomware victims led our team to conclude that this attack was specifically aimed at organizations within Ukraine. ★★
securityintelligence.webp 2017-06-29 12:00:22 Maintaining CIA to Keep Health Care Security Threats at Bay (lien direct) Health care security threats that compromise the confidentiality, integrity and availability of critical data can force hospitals to halt operations. ★★★★★
securityintelligence.webp 2017-06-29 11:30:19 How Hotel Cybersecurity Keeps Guests and Data Secure (lien direct) Hotel cybersecurity is not just about protecting financial data - it extends to guests' physical and digital property, vulnerable endpoints and more.
securityintelligence.webp 2017-06-29 10:00:33 IBM Named a Leader in Inaugural Gartner Magic Quadrant for Access Management, Worldwide (lien direct) Gartner recognized IBM as a Leader for its completeness of vision and ability to execute in the first ever Magic Quadrant for Access Management, Worldwide. Guideline
securityintelligence.webp 2017-06-28 12:00:22 In Case You Missed the Memo: What\'s New in IBM\'s Application Security Testing? (lien direct) New enhancements to IBM's application security testing solutions enable clients to simplify SAST, remediate open source vulnerabilities and more.
securityintelligence.webp 2017-06-28 11:30:20 Four Ways CISOs Can Play a Key Role in Educating Top Leadership About Cyber Risks (lien direct) Security leaders must translate their technical expertise into business insights when communicating cyber risks to executives and board directors. Guideline
securityintelligence.webp 2017-06-27 21:15:19 Petya Weren\'t Expecting This: Ransomware Takes Systems Hostage Across the Globe (lien direct) It appears that the current Petya payload is being distributed using the same exploits that were part of the leaks that powered the spread of WannaCry. Wannacry
securityintelligence.webp 2017-06-27 11:40:17 Execute Your IoT Deployment by the Book (lien direct) More connected devices means a larger threat surface. That's why it's critical to prioritize security when designing your IoT deployment.
Last update at: 2024-07-03 08:07:54
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter