Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-27 21:15:19 |
Petya Weren\'t Expecting This: Ransomware Takes Systems Hostage Across the Globe (lien direct) |
It appears that the current Petya payload is being distributed using the same exploits that were part of the leaks that powered the spread of WannaCry.
|
|
Wannacry
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-27 11:40:17 |
Execute Your IoT Deployment by the Book (lien direct) |
More connected devices means a larger threat surface. That's why it's critical to prioritize security when designing your IoT deployment.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-27 11:05:16 |
Funny Money: Exploring the Connection Between Bitcoin and Ransomware (lien direct) |
Fraudsters obviously prefer to deal in digital currency to remain anonymous, but bitcoin and ransomware are also intertwined in other, more complex ways.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-26 13:00:19 |
New Threats? No Problem! Identify Emerging Cybercrime Trends Early to Fight Financial Fraud (lien direct) |
Banks and financial institutions require a dynamic strategy to identify emerging cybercrime trends and stop fraudsters in their tracks.
|
|
|
★★★★
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-26 11:25:18 |
Should We Disconnect to Improve IoT Security? (lien direct) |
There is no such thing as total IoT security, and the value businesses can gain from the technology outweighs the perceived benefit of disconnecting.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-23 12:05:20 |
Game Over: Improving Your Cyber Analyst Workflow Through Gamification (lien direct) |
Gamification is an engaging way to motivate security operations center analysts to develop their incident response skills and situational awareness.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-23 10:45:17 |
Five Ways Enterprises Can Close the Cybersecurity Skills Gap (lien direct) |
To reduce the effects of the cybersecurity skills gap, organizations should ditch traditional recruiting methods and think outside the box.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-22 12:15:18 |
Health Care Endpoint Hygiene: A Post-WannaCry Call to Action (lien direct) |
The idea of employing basic endpoint hygiene to keep your data safe seems like a no-brainer. So why was the WannaCry ransomware attack so damaging?
|
|
Wannacry
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-22 11:35:15 |
The Enemy Within: Identifying Insider Threats in Your Organization (lien direct) |
According to recent research, privileged users and administrators represent the biggest insider threats to any organization's sensitive data.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-21 12:45:30 |
More Mobile Apps Means More Man-in-the-Middle Attacks (lien direct) |
Mobile devices that contain unsanctioned apps are particularly vulnerable to man-in-the-middle attacks, especially when connected to unsecured Wi-Fi.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-21 11:15:15 |
In Search of Equilibrium: Compliance and Security (lien direct) |
When properly aligned with business goals, compliance and security work in concert as part of a holistic, integrated system.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-20 15:05:20 |
TrickBot Spreads to the Nordics, Launches Redirection Attacks in France (lien direct) |
The TrickBot Trojan, which recently tested redirection attacks in France, expanded its list of targets to include banks in Sweden and other Nordic areas.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-20 10:00:21 |
Know the Odds: The Cost of a Data Breach in 2017 (lien direct) |
According to a recent Ponemon Institute study, the global cost of a data breach decreased by 10 percent between 2016 and 2017.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-19 12:00:18 |
Can AI and Machine Learning Help Fill the Cybersecurity Skills Gap? (lien direct) |
Businesses and government agencies across all industries face a cybersecurity skills crisis. Can AI and machine learning help solve the problem?
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-19 11:25:14 |
Cyber Solstice: IT Security Tasks to Tackle on the Longest Day of the Year (lien direct) |
Security professionals should take advantage of the longest day of the year to take care of security tasks that are typically placed on the back burner.
|
|
|
★★
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-19 10:45:15 |
A Brief History of Computing: As Technology Evolves, Cybersecurity Lags Behind (lien direct) |
As computers evolved throughout history, developers repeatedly failed to build cybersecurity into the increasingly complex machines.
|
|
|
★★★★
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-16 12:16:18 |
The Power of the Security Immune System (lien direct) |
A security immune system is an integrated set of complimentary controls - not a single solution - working together to protect network data.
|
|
|
★★★★★
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-15 12:06:15 |
Changing How We Educate and Hire With a New Collar Approach (lien direct) |
Who said you need a degree to work in IT? A new collar approach to recruiting can help organizations close the cybersecurity skills gap.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-15 11:31:18 |
Zeus Sphinx Pushes Empty Configuration Files - What Has the Sphinx Got Cooking? (lien direct) |
Amid a period of targetless activity, IBM X-Force researchers are wondering where the operators behind the Zeus Sphinx Trojan are planning to strike next.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-14 12:16:18 |
Technology Treatment Plan: The Health Care Cybersecurity Imperative (lien direct) |
The U.S. Department of Health and Human Services established guidelines to improve the state of health care cybersecurity throughout the sector.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-14 11:46:20 |
Creating a Culture of Security Through Change Management (lien direct) |
Effective change management requires thorough planning, constant communication, and strong leadership capable of swaying the organizational culture.
|
Guideline
|
|
★★★★
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-14 10:51:19 |
Bringing Systems Integration Skills to Cybersecurity Degree Students (lien direct) |
The Enterprise Cyber Security (ECS) module teaches cybersecurity degree students to think of security as a system of interrelated, integrated components.
|
|
|
★★
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-13 13:01:23 |
Digital Transformation Means Infusing Identity Everywhere (lien direct) |
A secure digital transformation requires IDaaS solutions that enable IT to support business mandates without compromising the user experience.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-13 12:01:19 |
Closing the Cybersecurity Skills Gap Through Mergers and Acquisitions (lien direct) |
To close the cybersecurity skills gap, a large company with considerable funds can simply acquire another organization and conscript its IT talent.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-13 11:31:18 |
Addressing Security Gaps in the Energy Industry (lien direct) |
To address security gaps in the energy industry, organizations must empower leaders to take full responsibility for cyberdefense and hold them accountable.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-12 12:01:19 |
10 Ways to Fight Advanced Malware With Threat Intelligence Sharing (lien direct) |
The X-Force Exchange threat intelligence sharing platform brings collaboration to the forefront of the ongoing fight against WannaCry and other malware.
|
|
Wannacry
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-12 11:36:14 |
Asleep at the Switches: Don\'t Let Cyber Fatigue Catch Your Enterprise Off Guard (lien direct) |
To combat cyber fatigue, security leaders must communicate the importance of password hygiene without diluting the message.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-12 10:46:17 |
Financial Sector Remains a Top Target in 2017 (lien direct) |
Our prediction at the end of 2016 held true: The influx of advanced DDoS, POS and other attacks targeting the financial sector has yet to abate in 2017.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-09 12:06:14 |
Don\'t Wait for the Next WannaCry - Update Your SMB Protocol Before It\'s Too Late (lien direct) |
To defend your infrastructure against future exploits, it's critical to disable the insecure original version of the SMB protocol.
|
|
Wannacry
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-09 11:56:12 |
Building Upon Trump\'s Executive Order on Cybersecurity (lien direct) |
President Trump's executive order on cybersecurity sent a powerful message about the real-world implications of information security.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-08 16:51:22 |
IBM Picks Up Six: A Leader in 2017 Gartner Magic Quadrant for Enterprise Mobility Management (lien direct) |
IBM was named a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for the sixth consecutive year.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-08 12:11:16 |
Securing Your Enterprise Assets While Traveling for Work (lien direct) |
It is critical to ensure that the right policies and controls are in place to help defend enterprise assets before a business trip, on the go and at home.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-08 11:41:15 |
Drilling for Answers: Cyberattacks on the Rise in the Oil and Gas Industry (lien direct) |
As cybercriminals have begun plumbing new avenues of attack, the oil and gas industry has experienced a rise in cyberattacks over the past year.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-07 12:36:14 |
The New NIST Digital Identity Guidelines and What They Mean to You (lien direct) |
With the most recent draft of its Digital Identity Guidelines, NIST revised many of its federal recommendations regarding passwords and access management.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-07 12:01:18 |
Using Network Insights to Stay One Step Ahead of Emerging Threats (lien direct) |
With the right network insights, analysts can deal with existing threats such as WannaCry, and quickly detect and respond to new attacks as they emerge.
|
|
Wannacry
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-07 11:16:14 |
Five Tips to Stay Safe on Social Media While Traveling (lien direct) |
Posting vacation pictures or specific travel information online can expose social media users to identity theft, social engineering schemes and more.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-06 15:21:16 |
Closing the Awareness Gap Requires a Team Effort (lien direct) |
The effort to close the cybersecurity awareness gap requires collaboration and coordination between multiple academic and professional stakeholders.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-06 11:51:14 |
Avoiding Security Hype, the Hazard From Hollywood (lien direct) |
Unfortunately, the Hollywood approach of security hype doesn't do much to help organizations improve their actual security.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-06 11:01:16 |
Manufacturing Security Incidents: Forty Percent Higher Than Cross-Industry Average in 2016 (lien direct) |
In manufacturing, security incidents occurred at a rate 40 percent higher than the average across all other industries in 2016, according to X-Force data.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-05 13:41:14 |
Four Key Considerations for Managing Your IoT Population (lien direct) |
To effectively manage your IoT population, you must understand where your devices are, what they do, who is using them and how they connect to the network.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-05 13:01:16 |
Security Awareness: How to Make Your Weakest Link Part of Your Defense (lien direct) |
A well-aligned, orchestrated security awareness program can help IT leaders strengthen the weakest link in any security program: users.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-05 09:51:14 |
Embracing the GDPR as a Catalyst for Innovation (lien direct) |
Now is the time for security leaders to stop talking about the GDPR and start acting to achieve compliance before the law takes effect in May 2018.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-02 13:01:24 |
QakBot Banking Trojan Causes Massive Active Directory Lockouts (lien direct) |
IBM X-Force attributed a recent wave of malware-induced Active Directory (AD) lockouts across several IR engagements to the operators of the QakBot Trojan.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-02 11:21:21 |
Mark Your Calendar: IBM X-Force Tracks Cyberattacks by Month (lien direct) |
According to IBM X-Force research, 19 percent of cyberattacks observed over the past two years occurred during the month of December.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-02 10:01:16 |
Information Security in the Age of Disinformation (lien direct) |
With so much disinformation being reported in the news and spread through social media, it's hard for security professionals to know what to believe.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-01 12:01:20 |
Security in Dog Years, Malware Analysis in Minutes (lien direct) |
IBM X-Force Malware Analysis enables security teams to examine potentially problematic files, prioritize events and respond to threats quickly.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-06-01 11:31:14 |
Big Data Control Frameworks: Have Your Data and Control It Too (lien direct) |
Under a strong data control framework, vendors provide exceptional analytics tools without requiring owners to relinquish total control of the data.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-05-31 12:01:15 |
WannaCry II: The Sequel No One Wants to See (lien direct) |
Everyone loves a good sequel, but security professionals hope to avoid a follow-up to WannaCry, this summer's biggest surprise blockbuster.
|
|
Wannacry
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-05-31 11:41:14 |
Industry 4.0 Drives a New Era of Mainframe Security (lien direct) |
In the Industry 4.0 era, mainframe security is supported by four key areas: big data, analytics, human-machine interaction and cognitive computing.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-05-31 10:01:15 |
Cisco and IBM Raise Cybersecurity to the Power of Two (lien direct) |
Cisco and IBM recently announced they are joining forces to empower cybersecurity teams to more effectively share threat data.
|
|
|
|