Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-03-03 12:05:40 |
Abuse of Privileges: Common Barriers to Managing Privileged Accounts (lien direct) |
Companies often face challenges related to shared IDs, third-party access, regulatory compliance and privilege creep when managing privileged accounts.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-03-02 13:50:41 |
Nine Security Tips That Go Outside the Box (lien direct) |
Even the most basic security measures can go a long way toward thwarting cybercrime. Use these simple yet effective security tips to protect your network.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-03-02 12:40:46 |
\'In Security\' Web Comic, Episode 006: The Great Dawnack (lien direct) |
In this installment of "In Security," the Great Dawnack's crystal ball depicted a troubling future for companies battling increasingly advanced threats.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-03-02 11:10:44 |
Prepared for the GDPR? Top 10 Findings From Hurwitz & Associates Survey (lien direct) |
A recent Hurwitz & Associates survey revealed that while general awareness about the GDPR is high, many companies are unprepared to meet the deadline.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-03-01 13:35:40 |
Viva Las Vegas, and Viva Effective Application Security Testing Practices! (lien direct) |
At IBM InterConnect, attendees will learn how to apply cognitive solutions to keep their application security testing programs one step ahead of threats.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-03-01 13:00:52 |
GootKit Developers Dress It Up With Web Traffic Proxy (lien direct) |
X-Force researchers revealed the cybergang behind Gootkit had upgraded the banking Trojan with new network interception and certificate bypass methods.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-03-01 12:25:39 |
Your IBM i Holds Your Crown Jewels. What Are You Doing to Protect Them? (lien direct) |
As threats become more advanced, it's increasingly critical for security teams to proactively monitor what's happening within and outside of IBM i.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-28 16:55:40 |
How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability (lien direct) |
It's critical to protect sensitive cloud-based data using encryption while it is being stored, and to delete it securely at the end of its life cycle.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-28 15:55:40 |
Watson Proves a Fast Learner in Cybersecurity Test Run (lien direct) |
Watson proved to be a fast learner during its test run in the Smarttech SOC, eventually becoming a trusted adviser to the team's analysts.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-28 13:00:52 |
Dridex\'s Cold War: Enter AtomBombing (lien direct) |
IBM X-Force researchers discovered that an upgraded version of Dridex has been using a new injection method, signifying the Trojan's continued evolution.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-27 13:30:48 |
Mobile Mania! IBM MaaS360 Unveils New Benchmarks and Security Index (lien direct) |
The IBM MaaS360 team released its Mobile Metrics report to kick off Mobile World Congress and illustrate the state of the ever-shifting mobile landscape.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-27 13:00:45 |
IBM Is a Leader, Again, in the 2017 Gartner Magic Quadrant for IGA (lien direct) |
IBM Security was named a Leader in the recently published "2017 Gartner Magic Quadrant for IGA" for the third consecutive year.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-27 12:20:42 |
Govern Your API Banking Environment (lien direct) |
As the financial services landscape increasingly shifts toward digital solutions, it is more crucial than ever to secure API banking environments.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-24 13:50:40 |
Cybersecurity Regulations Get Demanding (lien direct) |
CISOs must closely monitor their companies' business transactions to maintain compliance with the growing number of international security regulations.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-24 12:45:39 |
Making the Move to an All-HTTPS Network (lien direct) |
There are countless benefits to moving web infrastructure to support the HTTPS protocol, but it's not as simple as swapping one protocol for another.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-24 11:50:40 |
The First Rule of Security Club: Don\'t Talk About Security (lien direct) |
The first rule about Security Club is don't talk about security - or, at least, don't let security initiatives get in the way of delivering business value.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-23 13:40:40 |
Connecting the Dots With the IBM Cognitive SOC and Watson for Cyber Security (lien direct) |
With IBM's Cognitive SOC and Watson for Cyber Security, analysts can detect and respond to incidents that traditional threat intelligence platforms miss.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-23 13:00:42 |
Gartner IAM Summit London 2017: Your Guide to the Swag and Must-Attend Sessions (lien direct) |
At this year's Gartner IAM Summit, attendees will learn how to leverage IAM-as-a-service and actionable intelligence to prevent insider attacks and more.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-23 12:15:40 |
The Best Defense Is a Good Offense: The Value of User Education (lien direct) |
User education and online safety training can be invaluable weapons against cyberthreats, especially for IT teams that are short on resources.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-23 08:03:24 |
National Security Requires Real-Time Endpoint Compliance (lien direct) |
Federal agencies need to implement a continuous management solution to remain in compliance and prevent cyberthreats from compromising national security.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-22 13:50:41 |
Time to End the Tension Between Corporate Remediation and Security Teams (lien direct) |
Although remediation and security teams are working toward a common goal, their conflicting priorities, culture and tools often lead to discord.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-22 13:00:44 |
The Disconnected Digital World (lien direct) |
As we continue our transformation into a digital world, IT leaders must find ways to resolve disconnects related to communication, policy, tools and more.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-22 11:45:40 |
Adaptive Security: The Safety Net in the Flying Trapeze Act (lien direct) |
IT leaders should use adaptive security solutions as a safety net to protect user, customer and corporate data from fraudsters.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-21 16:30:42 |
RSA Wrap-Up: Top Stories From the 2017 RSA Conference (lien direct) |
For our RSA wrap-up, we summarized some key points and takeaways about emerging trends such as the IoT, security analytics and the IT skills shortage.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-21 13:15:41 |
Disposing of Your Device: Don\'t Throw the Data Out With the Old PC (lien direct) |
Disposing of your device securely means wiping old data, deauthorizing account access and finding an ecologically sound home for the old device.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-21 12:10:40 |
IAM Feeling Good? What CISOs Should Know About the Feeling of Identity and Access Management Solutions (lien direct) |
Identity and access management (IAM) is critical, but an inconvenient authentication process makes for a lousy user experience.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-20 13:40:39 |
Shadow IT Comes of Age (lien direct) |
Harnessing shadow IT starts with security leaders. IT and security teams must work together to identify problem areas and provide quality solutions.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-20 12:55:38 |
Can You Inoculate Your Organization Against Cybercrime? (lien direct) |
A cybersecurity immune system can "inoculate" your organization against attacks by ingesting and using the latest threat intelligence.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-20 11:35:38 |
Blurred Lines: Make Security Personal (lien direct) |
IT managers must make security personal to encourage employees in their organizations to adopt better security practices and improve their online hygiene.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-17 19:00:42 |
An IoT Love Story: Always Apart, Never Disconnected (lien direct) |
Connected devices are beginning to change ownership for the first time, which presents new IoT security challenges for manufacturers.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-17 13:00:42 |
RSA Tips for CISOs: From 10 Years Ago to Today (lien direct) |
CISOs struggling with long-term security challenges can glean some helpful information based off RSA tips presented at this year's conference.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-17 12:30:40 |
2017 HIMSS Conference and Exhibition: IBM MaaS360 (lien direct) |
IBM will demonstrate how MaaS360 can help health care IT professionals manage the mobile devices on their networks at this year's HIMSS Conference.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-16 14:10:39 |
The Coming Revolution of Voice Control With Artificial Intelligence (lien direct) |
New capabilities such as artificial intelligence and voice control make it easier to interact with our devices, but they also introduce security concerns.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-16 13:00:41 |
It\'s Time for Users to Pony Up and Quit Reusing Passwords (lien direct) |
By reusing passwords across multiple services, users make it easier for cybercriminals to breach all their accounts, not to mention company databases.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-16 12:05:37 |
CSOs Who Understand the User Experience Deliver Better Security (lien direct) |
A smooth user experience leads to more secure systems and databases. CSOs should consult users directly to resolve issues related to the data they access.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-15 18:00:43 |
The Full Shamoon: How the Devastating Malware Was Inserted Into Networks (lien direct) |
X-Force IRIS researchers found that the Shamoon malware operators relied on weaponized documents that leveraged PowerShell to infiltrate targeted networks.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-15 13:10:38 |
Before, During and After: Dealing With Attacks and Applying Effective Incident Management (lien direct) |
A planned, communicated, rehearsed and organizationally tailored incident management program is central to an effective security strategy.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-15 12:05:36 |
Time to Stop Shaming Phishing Victims (lien direct) |
It is counterproductive to shame phishing victims because it discourages end users from alerting IT professionals of suspicious emails or activity.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-14 13:30:39 |
For the Love of SIEM (lien direct) |
Not feeling the love from your SIEM solution? Integrate it with existing tools to best fit the unique needs and goals of your business.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-14 12:35:36 |
Learn to Love Online Dating Security (lien direct) |
IT leaders must educate employees about online dating security to minimize the risks associated with the use of these services in the workplace.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-14 11:30:39 |
Indian Banking Customers, Beware! Hackers Have an Eye on Your Money (lien direct) |
The Indian government implemented new policies and guidance in response to several high-profile attacks against the Indian banking sector in the past year.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-13 10:05:37 |
Bringing the Power of Watson and Cognitive Computing to the Security Operations Center (lien direct) |
The power of Watson and cognitive computing enables security operations center specialists to defend their environments against threats with confidence.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-13 10:00:45 |
IBM QRadar Advisor with Watson: Revolutionizing the Way Security Analysts Work (lien direct) |
IBM Security developed QRadar Advisor to help IT analysts address gaps in speed, accuracy and intelligence and respond to incidents more confidently
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-13 10:00:41 |
It\'s Time to Go Beyond Next-Generation Endpoint Security (lien direct) |
To protect the most vulnerable gateways into their networks, IT leaders must go beyond next-generation endpoint security with IBM BigFix Detect.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-10 14:00:55 |
The Red Portal: IBM X-Force Red\'s Collaborative Client Experience (lien direct) |
IBM X-Force Red launched The Red Portal, which provides security professionals and clients with an end-to-end view of security testing programs.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-10 13:00:39 |
Overcoming the Security Side-Eye: Making Collaborative Threat Intelligence Work (lien direct) |
To effectively share threat intelligence, security professionals must develop processes, resources and trust relationships with other industry players.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-10 11:30:39 |
The Future of Cybersecurity (lien direct) |
Emerging technologies such as big data analytics, cognitive computing and the Internet of Things (IoT) are shaping the future of cybersecurity.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-09 14:05:35 |
SAP HANA Security Evolution, From SPS08 to Now (lien direct) |
The SAP HANA security evolution started in 2011, peaked in 2014 and continues to deliver critical enhancements to provide analysts with greater visibility.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-09 13:10:38 |
An Education Initiative in Cognitive Application: How I Embarked on Designing a Master\'s Course for GSU (lien direct) |
An education in cognitive application should demonstrate the power of Watson and show students what it takes to become a security analyst.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-02-09 12:40:36 |
Did Your Developer Leave a Website Backdoor? (lien direct) |
A Dutch developer stole e-commerce customers' login credentials using a website backdoor and admin access that former employers had neglected to revoke.
|
|
|
|