Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-27 11:30:25 |
After Big Takedown Efforts, 20 More BankBot Mobile Malware Apps Make It Into Google Play (lien direct) |
IBM X-Force researchers discovered 20 apps in the Google Play Store that deliver mobile malware to unsuspecting Android users.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-26 13:30:18 |
Estonia to Build Off-Site Data Center in Luxembourg (lien direct) |
Pending negotiations with Luxembourg, Estonia will become the first nation to build an off-site data center in another country.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-26 11:15:17 |
Psychological Security: Helping Your Team Think Like Cybercriminals (lien direct) |
Psychological security refers to the notion that to defend a network against threats, security professionals must be able to think like cybercriminals.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-25 12:35:15 |
The Evolution of Digital Certificates (lien direct) |
Digital certificates are used to authenticate both sides of a browser connection. It's a good first step, but certificates do not assure absolute trust.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-25 11:50:16 |
Cybercrime Awareness Should Be Fun (lien direct) |
Cybercrime awareness training is too crucial to be glossed over during onboarding or quickly rehashed at the end of the year.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-25 11:05:15 |
Administrator Credentials: A Security Breach Waiting to Happen (lien direct) |
If access is not properly secured, cybercriminals can use weak administrator credentials to take control over corporate networks.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-24 14:45:16 |
Multipronged IoT Security to Help Realize the Value of IoT Solutions (lien direct) |
IT decision-makers should invest in reliable tools and the help of trusted experts to respond to emerging IoT security challenges.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-24 13:00:16 |
IBM X-Force Red Turns 1, Expands Into Auto and IoT Practice Areas (lien direct) |
Today IBM X-Force Red launches a collaboration with the Watson IoT Platform to help ensure that all IoT solutions get our special brand of hacker love.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-24 11:20:17 |
Who Is Responsible for Cloud Security? (lien direct) |
Cloud security must be a team effort between providers and customers. The distribution of responsibility depends on the cloud model.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-21 13:10:16 |
Getting the Most Out of Black Hat (lien direct) |
The Black Hat conference offers a chance to network and glean insights from experts that can change the way you think about security.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-21 12:05:13 |
Employee Education Is the Key to Enhanced Protection for Energy Companies (lien direct) |
The U.S. energy infrastructure requires enhanced protection, and CISOs must educate their employees about security risks to those critical assets.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-20 13:10:26 |
The Living Dead: How to Protect Legacy Systems (lien direct) |
When patching legacy systems is simply not an option, security teams must take steps to minimize the risks associated with outdated software.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-20 11:55:13 |
Cloud Security Is Not an Either/Or (lien direct) |
Cloud security is neither a magic bullet for analysts, nor a particularly vulnerable target for cybercriminals. It all depends on the effort you put in.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-19 11:45:26 |
TrickBot Habla Español: Trojan Widens Its Attack Scope in Spain, Brings Redirection Attacks to Local Banks (lien direct) |
The TrickBot Trojan has been steadily ramping up its activity this year, going into a rather intensive period of updates and attacks that started in Q2.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-19 11:10:28 |
Monitor Your Network for NotPetya in Real Time (lien direct) |
With the QRadar NotPetya Content Pack, security analysts can monitor their networks for indicators of NotPetya ransomware in real time.
|
|
NotPetya
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-18 13:10:28 |
Connecting Fintech Security Perceptions to Reality (lien direct) |
The state of fintech security will fluctuate based on the industry's ability to maintain regulatory compliance and stay abreast of cybercrime trends.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-18 12:00:30 |
Uncover Omnichannel Fraud Faster (lien direct) |
With so many ways to connect with banks today, financial organizations need omnichannel fraud detection tools to distinguish customers from fraudsters.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-18 10:45:26 |
Responsive Machine Learning: The Necessary Evolution of Endpoint Security (lien direct) |
With responsive machine learning, analysts can create robust training sets by combining thousands of malware samples with current data on software updates.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-17 12:10:28 |
Top Cybersecurity Trends for the First Half of 2017 (lien direct) |
Many of the most notable cybersecurity trends of the first half of 2017, such as the rapid evolution of malware techniques, will continue through the year.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-17 12:00:44 |
Achieve the Ultimate Data Protection for Your Trusted Digital Experience (lien direct) |
IBM z14 provides pervasive encryption capabilities to help organizations improve data protection and maintain regulatory compliance.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-17 11:10:27 |
How Virus Protection Software Has Evolved With the Threat Landscape (lien direct) |
Virus protection software has come a long way in the past 30 years, and the advent of machine learning represents a bright future for malware fighters.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-14 13:25:23 |
The Limits of Linguistic Analysis for Security Attribution (lien direct) |
Linguistic analysis can provide clues to help security analysts trace the source of a cyberattack, but the method is inconclusive on its own.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-14 13:20:26 |
The 21st-Century Real Estate Deal: How the Internet of Things Is Changing Commercial Real Estate (lien direct) |
The Internet of Things is disrupting the real estate industry, requiring brokers to develop new skills to help clients maximize their investments.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-13 11:55:22 |
Half-Year Roundup: The Top Five Data Breaches of 2017 - So Far (lien direct) |
Organizations around the world and across industries have had to deal with more than their fair share of devastating data breaches so far in 2017.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-13 11:05:24 |
Is Blockchain the Key to Stopping Ransomware Attacks? (lien direct) |
Since bitcoin conversions are processed on a blockchain, security analysts can trace transactions to determine the root cause of a ransomware attack.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-12 12:10:26 |
Preventative Medicine: Get a Health Check for Your SIEM (lien direct) |
Like the human body, security information and event management (SIEM) solutions require regular checkups to maintain optimal functionality.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-12 11:15:24 |
Outsider or Insider: Who Will Cause Today\'s Data Breach? (lien direct) |
Security leaders must defend sensitive enterprise information from both external actors and negligent insiders who might accidentally cause a data breach.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-11 12:00:32 |
The Promise of a Unified App Catalog for the Enterprise (lien direct) |
A unified app catalog can help IT leaders properly manage the mobile workforce and secure disparate applications running on different operating systems.
|
Guideline
|
|
★★★★
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-11 11:10:26 |
The Internet of Things to Come in Cybersecurity (lien direct) |
The Internet of Things offers convenience and fun in the form of step counters and other innovative toys, but it also puts health data and PII at risk.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-10 12:00:27 |
Information and Communication Technology (ICT) Industry: Second-Most Attacked Sector in 2016 (lien direct) |
The information and communication technology (ICT) industry suffered the second-most attacks out of all sectors monitored by IBM X-Force in 2016.
|
|
|
★★
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-10 11:25:21 |
A Primer on Cross-Site Scripting (XSS) (lien direct) |
XSS is a prevalent web-based exploit in which threat actors inject malicious code into webpages to compromise data or facilitate phishing scams.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-10 10:15:25 |
Companies Around the World are Ramping Up for the GDPR - Is Yours? (lien direct) |
The General Data Protection Regulation (GDPR) will take effect on May 25, 2018, and companies that fail to prepare may face steep fines.
|
|
|
★★★★★
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-07 11:10:23 |
The Cybersecurity Skills Gap Is No Match for Cognitive Security (lien direct) |
Cognitive security tools enable SOC analysts to bridge gaps in intelligence, speed and accuracy, and empowers team leaders to address the IT skills gap.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-07 09:45:22 |
Can You Guess the Cost of a Data Breach in the Asia-Pacific? (lien direct) |
The rapid expansion of the Asia-Pacific economy is presenting new cybersecurity challenges and driving up the cost of a data breach in the region.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-06 11:55:37 |
Using SIEM Solutions to Connect the Security Dots and Detect Ransomware (lien direct) |
Security tools can only provide so much value in isolation. An SIEM platform helps analysts connect the dots between data produced by disparate solutions.
|
|
|
★★
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-06 11:05:21 |
Succession Planning: The Importance of a Deputy CISO (lien direct) |
To ensure a smooth transfer of security power, organizations should establish a definitive plan to appoint and develop a deputy CISO.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-05 11:45:20 |
Spot (and Remedy) the Rotten Apple Before It Spoils the SIEM Barrel (lien direct) |
It can be hard to determine false alarm security events with SIEM solutions. Through IBM's new partnership with AlgoSec, your team has a new tool to help.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-05 10:20:22 |
Current Trends in Identity and Access Management: July 2017 (lien direct) |
At the midpoint of 2017, five trends are emerging in the identity and access management, and with these waves comes an opportunity for security teams.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-03 11:40:20 |
Going Through a Rough Patch in Your Security Program? Consistent Software Patching Can Solve Security Woes (lien direct) |
Effective and consistent software patching can solve the majority of common security challenges, yet many organizations struggle with patch management.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-07-03 11:00:21 |
The Emergence of Virtual Reality and Augmented Reality in the Security Operations Center (lien direct) |
New technologies like augmented and virtual reality may be the next big thing for security operations centers.
|
|
|
★★★★
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-30 14:35:19 |
SD-WAN: Improve Security and Reduce Cost While Complying with Payment Card Industry Standards (lien direct) |
SD-WAN technologies are transforming the way enterprise retailers approach connectivity and implementation of security functions at branch locations.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-30 11:15:19 |
The XX Factor: The Critical Role of Women in Closing the Cybersecurity Skills Gap (lien direct) |
With 1.8 million IT positions set to go unfilled by 2022, closing the industry's gender gap can go a long way toward closing the cybersecurity skills gap.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-29 20:30:21 |
A \'Wiper\' in Ransomware Clothing: Global Attacks Intended for Destruction Versus Financial Gain (lien direct) |
Further analysis of impacted Petya ransomware victims led our team to conclude that this attack was specifically aimed at organizations within Ukraine.
|
|
|
★★
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-29 12:00:22 |
Maintaining CIA to Keep Health Care Security Threats at Bay (lien direct) |
Health care security threats that compromise the confidentiality, integrity and availability of critical data can force hospitals to halt operations.
|
|
|
★★★★★
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-29 11:30:19 |
How Hotel Cybersecurity Keeps Guests and Data Secure (lien direct) |
Hotel cybersecurity is not just about protecting financial data - it extends to guests' physical and digital property, vulnerable endpoints and more.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-29 10:00:33 |
IBM Named a Leader in Inaugural Gartner Magic Quadrant for Access Management, Worldwide (lien direct) |
Gartner recognized IBM as a Leader for its completeness of vision and ability to execute in the first ever Magic Quadrant for Access Management, Worldwide.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-28 12:00:22 |
In Case You Missed the Memo: What\'s New in IBM\'s Application Security Testing? (lien direct) |
New enhancements to IBM's application security testing solutions enable clients to simplify SAST, remediate open source vulnerabilities and more.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-28 11:30:20 |
Four Ways CISOs Can Play a Key Role in Educating Top Leadership About Cyber Risks (lien direct) |
Security leaders must translate their technical expertise into business insights when communicating cyber risks to executives and board directors.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-27 21:15:19 |
Petya Weren\'t Expecting This: Ransomware Takes Systems Hostage Across the Globe (lien direct) |
It appears that the current Petya payload is being distributed using the same exploits that were part of the leaks that powered the spread of WannaCry.
|
|
Wannacry
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-27 11:40:17 |
Execute Your IoT Deployment by the Book (lien direct) |
More connected devices means a larger threat surface. That's why it's critical to prioritize security when designing your IoT deployment.
|
|
|
|