What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2017-06-27 21:15:19 Petya Weren\'t Expecting This: Ransomware Takes Systems Hostage Across the Globe (lien direct) It appears that the current Petya payload is being distributed using the same exploits that were part of the leaks that powered the spread of WannaCry. Wannacry
securityintelligence.webp 2017-06-27 11:40:17 Execute Your IoT Deployment by the Book (lien direct) More connected devices means a larger threat surface. That's why it's critical to prioritize security when designing your IoT deployment.
securityintelligence.webp 2017-06-27 11:05:16 Funny Money: Exploring the Connection Between Bitcoin and Ransomware (lien direct) Fraudsters obviously prefer to deal in digital currency to remain anonymous, but bitcoin and ransomware are also intertwined in other, more complex ways.
securityintelligence.webp 2017-06-26 13:00:19 New Threats? No Problem! Identify Emerging Cybercrime Trends Early to Fight Financial Fraud (lien direct) Banks and financial institutions require a dynamic strategy to identify emerging cybercrime trends and stop fraudsters in their tracks. ★★★★
securityintelligence.webp 2017-06-26 11:25:18 Should We Disconnect to Improve IoT Security? (lien direct) There is no such thing as total IoT security, and the value businesses can gain from the technology outweighs the perceived benefit of disconnecting.
securityintelligence.webp 2017-06-23 12:05:20 Game Over: Improving Your Cyber Analyst Workflow Through Gamification (lien direct) Gamification is an engaging way to motivate security operations center analysts to develop their incident response skills and situational awareness.
securityintelligence.webp 2017-06-23 10:45:17 Five Ways Enterprises Can Close the Cybersecurity Skills Gap (lien direct) To reduce the effects of the cybersecurity skills gap, organizations should ditch traditional recruiting methods and think outside the box.
securityintelligence.webp 2017-06-22 12:15:18 Health Care Endpoint Hygiene: A Post-WannaCry Call to Action (lien direct) The idea of employing basic endpoint hygiene to keep your data safe seems like a no-brainer. So why was the WannaCry ransomware attack so damaging? Wannacry
securityintelligence.webp 2017-06-22 11:35:15 The Enemy Within: Identifying Insider Threats in Your Organization (lien direct) According to recent research, privileged users and administrators represent the biggest insider threats to any organization's sensitive data.
securityintelligence.webp 2017-06-21 12:45:30 More Mobile Apps Means More Man-in-the-Middle Attacks (lien direct) Mobile devices that contain unsanctioned apps are particularly vulnerable to man-in-the-middle attacks, especially when connected to unsecured Wi-Fi.
securityintelligence.webp 2017-06-21 11:15:15 In Search of Equilibrium: Compliance and Security (lien direct) When properly aligned with business goals, compliance and security work in concert as part of a holistic, integrated system.
securityintelligence.webp 2017-06-20 15:05:20 TrickBot Spreads to the Nordics, Launches Redirection Attacks in France (lien direct) The TrickBot Trojan, which recently tested redirection attacks in France, expanded its list of targets to include banks in Sweden and other Nordic areas.
securityintelligence.webp 2017-06-20 10:00:21 Know the Odds: The Cost of a Data Breach in 2017 (lien direct) According to a recent Ponemon Institute study, the global cost of a data breach decreased by 10 percent between 2016 and 2017.
securityintelligence.webp 2017-06-19 12:00:18 Can AI and Machine Learning Help Fill the Cybersecurity Skills Gap? (lien direct) Businesses and government agencies across all industries face a cybersecurity skills crisis. Can AI and machine learning help solve the problem?
securityintelligence.webp 2017-06-19 11:25:14 Cyber Solstice: IT Security Tasks to Tackle on the Longest Day of the Year (lien direct) Security professionals should take advantage of the longest day of the year to take care of security tasks that are typically placed on the back burner. ★★
securityintelligence.webp 2017-06-19 10:45:15 A Brief History of Computing: As Technology Evolves, Cybersecurity Lags Behind (lien direct) As computers evolved throughout history, developers repeatedly failed to build cybersecurity into the increasingly complex machines. ★★★★
securityintelligence.webp 2017-06-16 12:16:18 The Power of the Security Immune System (lien direct) A security immune system is an integrated set of complimentary controls - not a single solution - working together to protect network data. ★★★★★
securityintelligence.webp 2017-06-15 12:06:15 Changing How We Educate and Hire With a New Collar Approach (lien direct) Who said you need a degree to work in IT? A new collar approach to recruiting can help organizations close the cybersecurity skills gap.
securityintelligence.webp 2017-06-15 11:31:18 Zeus Sphinx Pushes Empty Configuration Files - What Has the Sphinx Got Cooking? (lien direct) Amid a period of targetless activity, IBM X-Force researchers are wondering where the operators behind the Zeus Sphinx Trojan are planning to strike next.
securityintelligence.webp 2017-06-14 12:16:18 Technology Treatment Plan: The Health Care Cybersecurity Imperative (lien direct) The U.S. Department of Health and Human Services established guidelines to improve the state of health care cybersecurity throughout the sector.
securityintelligence.webp 2017-06-14 11:46:20 Creating a Culture of Security Through Change Management (lien direct) Effective change management requires thorough planning, constant communication, and strong leadership capable of swaying the organizational culture. Guideline ★★★★
securityintelligence.webp 2017-06-14 10:51:19 Bringing Systems Integration Skills to Cybersecurity Degree Students (lien direct) The Enterprise Cyber Security (ECS) module teaches cybersecurity degree students to think of security as a system of interrelated, integrated components. ★★
securityintelligence.webp 2017-06-13 13:01:23 Digital Transformation Means Infusing Identity Everywhere (lien direct) A secure digital transformation requires IDaaS solutions that enable IT to support business mandates without compromising the user experience.
securityintelligence.webp 2017-06-13 12:01:19 Closing the Cybersecurity Skills Gap Through Mergers and Acquisitions (lien direct) To close the cybersecurity skills gap, a large company with considerable funds can simply acquire another organization and conscript its IT talent.
securityintelligence.webp 2017-06-13 11:31:18 Addressing Security Gaps in the Energy Industry (lien direct) To address security gaps in the energy industry, organizations must empower leaders to take full responsibility for cyberdefense and hold them accountable. Guideline
securityintelligence.webp 2017-06-12 12:01:19 10 Ways to Fight Advanced Malware With Threat Intelligence Sharing (lien direct) The X-Force Exchange threat intelligence sharing platform brings collaboration to the forefront of the ongoing fight against WannaCry and other malware. Wannacry
securityintelligence.webp 2017-06-12 11:36:14 Asleep at the Switches: Don\'t Let Cyber Fatigue Catch Your Enterprise Off Guard (lien direct) To combat cyber fatigue, security leaders must communicate the importance of password hygiene without diluting the message. Guideline
securityintelligence.webp 2017-06-12 10:46:17 Financial Sector Remains a Top Target in 2017 (lien direct) Our prediction at the end of 2016 held true: The influx of advanced DDoS, POS and other attacks targeting the financial sector has yet to abate in 2017.
securityintelligence.webp 2017-06-09 12:06:14 Don\'t Wait for the Next WannaCry - Update Your SMB Protocol Before It\'s Too Late (lien direct) To defend your infrastructure against future exploits, it's critical to disable the insecure original version of the SMB protocol. Wannacry
securityintelligence.webp 2017-06-09 11:56:12 Building Upon Trump\'s Executive Order on Cybersecurity (lien direct) President Trump's executive order on cybersecurity sent a powerful message about the real-world implications of information security.
securityintelligence.webp 2017-06-08 16:51:22 IBM Picks Up Six: A Leader in 2017 Gartner Magic Quadrant for Enterprise Mobility Management (lien direct) IBM was named a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for the sixth consecutive year. Guideline
securityintelligence.webp 2017-06-08 12:11:16 Securing Your Enterprise Assets While Traveling for Work (lien direct) It is critical to ensure that the right policies and controls are in place to help defend enterprise assets before a business trip, on the go and at home.
securityintelligence.webp 2017-06-08 11:41:15 Drilling for Answers: Cyberattacks on the Rise in the Oil and Gas Industry (lien direct) As cybercriminals have begun plumbing new avenues of attack, the oil and gas industry has experienced a rise in cyberattacks over the past year.
securityintelligence.webp 2017-06-07 12:36:14 The New NIST Digital Identity Guidelines and What They Mean to You (lien direct) With the most recent draft of its Digital Identity Guidelines, NIST revised many of its federal recommendations regarding passwords and access management.
securityintelligence.webp 2017-06-07 12:01:18 Using Network Insights to Stay One Step Ahead of Emerging Threats (lien direct) With the right network insights, analysts can deal with existing threats such as WannaCry, and quickly detect and respond to new attacks as they emerge. Wannacry
securityintelligence.webp 2017-06-07 11:16:14 Five Tips to Stay Safe on Social Media While Traveling (lien direct) Posting vacation pictures or specific travel information online can expose social media users to identity theft, social engineering schemes and more.
securityintelligence.webp 2017-06-06 15:21:16 Closing the Awareness Gap Requires a Team Effort (lien direct) The effort to close the cybersecurity awareness gap requires collaboration and coordination between multiple academic and professional stakeholders.
securityintelligence.webp 2017-06-06 11:51:14 Avoiding Security Hype, the Hazard From Hollywood (lien direct) Unfortunately, the Hollywood approach of security hype doesn't do much to help organizations improve their actual security.
securityintelligence.webp 2017-06-06 11:01:16 Manufacturing Security Incidents: Forty Percent Higher Than Cross-Industry Average in 2016 (lien direct) In manufacturing, security incidents occurred at a rate 40 percent higher than the average across all other industries in 2016, according to X-Force data.
securityintelligence.webp 2017-06-05 13:41:14 Four Key Considerations for Managing Your IoT Population (lien direct) To effectively manage your IoT population, you must understand where your devices are, what they do, who is using them and how they connect to the network.
securityintelligence.webp 2017-06-05 13:01:16 Security Awareness: How to Make Your Weakest Link Part of Your Defense (lien direct) A well-aligned, orchestrated security awareness program can help IT leaders strengthen the weakest link in any security program: users. Guideline
securityintelligence.webp 2017-06-05 09:51:14 Embracing the GDPR as a Catalyst for Innovation (lien direct) Now is the time for security leaders to stop talking about the GDPR and start acting to achieve compliance before the law takes effect in May 2018. Guideline
securityintelligence.webp 2017-06-02 13:01:24 QakBot Banking Trojan Causes Massive Active Directory Lockouts (lien direct) IBM X-Force attributed a recent wave of malware-induced Active Directory (AD) lockouts across several IR engagements to the operators of the QakBot Trojan.
securityintelligence.webp 2017-06-02 11:21:21 Mark Your Calendar: IBM X-Force Tracks Cyberattacks by Month (lien direct) According to IBM X-Force research, 19 percent of cyberattacks observed over the past two years occurred during the month of December.
securityintelligence.webp 2017-06-02 10:01:16 Information Security in the Age of Disinformation (lien direct) With so much disinformation being reported in the news and spread through social media, it's hard for security professionals to know what to believe.
securityintelligence.webp 2017-06-01 12:01:20 Security in Dog Years, Malware Analysis in Minutes (lien direct) IBM X-Force Malware Analysis enables security teams to examine potentially problematic files, prioritize events and respond to threats quickly.
securityintelligence.webp 2017-06-01 11:31:14 Big Data Control Frameworks: Have Your Data and Control It Too (lien direct) Under a strong data control framework, vendors provide exceptional analytics tools without requiring owners to relinquish total control of the data.
securityintelligence.webp 2017-05-31 12:01:15 WannaCry II: The Sequel No One Wants to See (lien direct) Everyone loves a good sequel, but security professionals hope to avoid a follow-up to WannaCry, this summer's biggest surprise blockbuster. Wannacry
securityintelligence.webp 2017-05-31 11:41:14 Industry 4.0 Drives a New Era of Mainframe Security (lien direct) In the Industry 4.0 era, mainframe security is supported by four key areas: big data, analytics, human-machine interaction and cognitive computing.
securityintelligence.webp 2017-05-31 10:01:15 Cisco and IBM Raise Cybersecurity to the Power of Two (lien direct) Cisco and IBM recently announced they are joining forces to empower cybersecurity teams to more effectively share threat data.
Last update at: 2024-07-13 19:08:21
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter