What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2017-01-16 11:30:32 Too Many Passwords: Is the End in Sight? (lien direct) Will passwords become things of the past in 2017? Today, organizations tasked with managing too many passwords are at risk of phishing and malware attacks.
securityintelligence.webp 2017-01-13 13:31:49 How to Ensure the Success of a Hot Desking Strategy (lien direct) A hot desking strategy allows employees to sit wherever they want, creating more flexibility for workers and more complexity for IT managers.
securityintelligence.webp 2017-01-13 13:00:33 The CIO Must Take Charge of the Organization\'s Application Portfolio (lien direct) With more businesses turning to SaaS and cloud-based systems, CIOs often lack a proper understanding of the organization's application portfolio.
securityintelligence.webp 2017-01-13 12:00:30 Online Services and Hospitality Security Go Hand in Hand (lien direct) Online lodging and transportation services offer unprecedented convenience, but their data collection practices have rankled hospitality security experts.
securityintelligence.webp 2017-01-12 13:25:28 Charisma Killed the Cat: Fostering an Effective Cybersecurity Leadership Style (lien direct) Too much charisma can make for ineffective cybersecurity leadership. CISOs should encourage IT employees to challenge their policies and decision-making. Guideline
securityintelligence.webp 2017-01-12 12:40:29 IP Theft: How Often Does Your IP Walk Out the Door? (lien direct) Outgoing employees are motivated by revenge, greed and resentment to abscond with valuable data. A robust exit process is the key to preventing IP theft.
securityintelligence.webp 2017-01-12 11:25:27 Protecting Your Staff in Co-Working Spaces (lien direct) Co-working spaces can help companies maximize productivity, but they can also introduce security concerns if employees are not trained to connect securely.
securityintelligence.webp 2017-01-11 13:55:27 Adopting SaaS: Tips and Best Practices for Cloud Transformation (lien direct) Despite its many cost and efficiency benefits, adopting SaaS can introduce new security issues if not managed and tested according to best practices.
securityintelligence.webp 2017-01-11 12:50:28 Don\'t Let Remote Management Software Contribute to Building Botnets (lien direct) IT leaders must be vigilant when using remote management software. Attackers can exploit these tools to infect devices with malware and build botnets. Guideline
securityintelligence.webp 2017-01-11 11:50:29 Predicting the Top Three Concerns for CISOs in 2017 (lien direct) The top concerns for CISOs in 2017 involve aligning with business goals, addressing the IT skills gap and the increasing sophistication of cyberthreats.
securityintelligence.webp 2017-01-10 13:50:29 Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data (lien direct) All access is not created equal. To protect your crown jewels from an insider threat, it's critical to know your data and, more importantly, your users.
securityintelligence.webp 2017-01-10 12:30:34 Client Maximus: New Remote Overlay Malware Highlights Rising Malcode Sophistication in Brazil (lien direct) IBM X-Force researchers discovered a new malware called Client Maximus that contains advanced code written specifically to attack banks in Brazil.
securityintelligence.webp 2017-01-10 09:05:28 Leapfrog the Skills Shortage and Security Intelligence Challenge With Cognitive Security (lien direct) Cognitive security solutions dig through structured and unstructured data to deliver deep insights and patterns and empower CISOs to make better decisions.
securityintelligence.webp 2017-01-09 14:20:30 The Pick of 2017 Cybersecurity Conferences (lien direct) These 2017 cybersecurity conferences offer educational and networking opportunities for security experts, professionals, enthusiasts and even hackers.
securityintelligence.webp 2017-01-09 12:50:29 Bearing Fruit: The Future of Mobile Technology as Apple\'s iPhone Turns 10 (lien direct) Mobile technology buffs and analysts are hoping Apple will revolutionize the smartphone market once again 10 years after it released the first iPhone.
securityintelligence.webp 2017-01-09 11:30:28 The Four Leading Security Threats of 2017 (lien direct) Long-standing security threats such as social engineering are predicted to take on new dimensions in the year ahead.
securityintelligence.webp 2017-01-06 13:40:32 Improve Threat Classification Accuracy With Supervised Machine Learning (lien direct) Supervised machine learning can free up security analysts to respond to actual threats instead of sifting through endless streams of false positives.
securityintelligence.webp 2017-01-06 12:55:26 Move the CSO to a Different Place on the Security Org Chart (lien direct) Organizations can improve their ability to enforce security policies and better serve business initiatives by shuffling the security org chart.
securityintelligence.webp 2017-01-06 12:00:28 User Behavior Analytics: Perfect for Analysis but Not Security (lien direct) User behavior analytics are great for identifying and monitoring cyberthreats, but not for defending or recovering critical assets.
securityintelligence.webp 2017-01-05 17:35:31 Android Vulnerabilities: Attacking Nexus 6 and 6P Custom Boot Modes (lien direct) X-Force researchers disclosed several Android vulnerabilities that could enable cybercriminals to use custom boot modes to take over Nexus 6 and 6P modems.
securityintelligence.webp 2017-01-05 12:55:26 SecOps Revisited: The Challenge of DevOps for Security (lien direct) Over the past 18 months, SecOps gained popularity in the developer and consumer communities as cybercriminals increasingly targeted cloud delivery models.
securityintelligence.webp 2017-01-05 11:30:29 Using Cognitive Security to Fight the Cybersecurity Borg (lien direct) IT teams face a security landscape that is, like the Borg in "Star Trek," persistent and technologically superior. Cognitive security is IT's best hope.
securityintelligence.webp 2017-01-04 14:10:28 How Can You Quantify the Value of Automated Provisioning and Deprovisioning? (lien direct) IT managers can justify security spending by emphasizing the value of provisioning and deprovisioning to improve the user experience and security policies.
securityintelligence.webp 2017-01-04 13:00:43 Exposing AV-Disabling Drivers Just in Time for Lunch (lien direct) IBM X-Force researchers discovered malicious AV-disabling drivers while investigating a financial malware campaign targeting Brazilian bank accounts.
securityintelligence.webp 2017-01-04 12:05:25 IoT Security: Who Is Stepping Up? (lien direct) Government agencies, customers and device manufacturers must develop better IoT security practices to protect the growing number of connected devices.
securityintelligence.webp 2017-01-03 13:31:01 The Importance of Building an Information Security Strategic Plan: Part 2 (lien direct) The CISO should be the central figure responsible for defining an organization's information security strategic plan and aligning it with business goals.
securityintelligence.webp 2017-01-03 12:55:25 Subtlety Is the Danger for Cybercrime Security Efforts (lien direct) With threats coming from all sides, it's easy for IT professionals to forget that cybercrime can take many unsophisticated forms.
securityintelligence.webp 2017-01-03 10:10:28 Mirror, Mirror: Using Self-Protection to Boost App Security (lien direct) The Prevoty QRadar App equips applications with self-protection capabilities and provides analysts with a magic mirror through which to identify threats.
securityintelligence.webp 2017-01-02 11:10:27 2017: A New Year\'s Security Resolution (lien direct) IT leaders should make a security resolution to improve basic hygiene, back up data regularly and share threat information to fight cybercrime in 2017. Guideline
securityintelligence.webp 2016-12-30 13:15:26 Migrating Security to the Cloud: A Model for Total Cost of Ownership (lien direct) When migrating security to the cloud, IT managers must measure the complete total cost of ownership, which includes tangible and intangible costs.
securityintelligence.webp 2016-12-30 12:30:26 HIPAA Settlements of 2016: Lessons Learned (lien direct) The HIPAA settlements from 2016 reinforce the importance of risk analysis when creating policies and procedures to protect PHI.
securityintelligence.webp 2016-12-29 13:20:27 Chip-and-PIN Credit Cards, One Year On (lien direct) At the end of 2016, more than a year after the official liability shift, most large retailers in the U.S. have finally adopted chip-and-PIN credit cards.
securityintelligence.webp 2016-12-29 12:35:23 BYOD Risks: Should Account Lockout Be Used After Failed Logins? (lien direct) For companies with a bring-your-own-device policy, IT managers should create security requirements that address BYOD risks without denting productivity.
securityintelligence.webp 2016-12-28 13:10:26 Cloud Security: Are Adopters Asking the Right Questions? (lien direct) As providers continue to evolve and differentiate from one another, consumers must ask the right questions when shopping for a cloud security solution.
securityintelligence.webp 2016-12-28 12:15:24 Avoiding the Technology Upgrade? Don\'t Dodge Security (lien direct) Consumers are buying new devices at a slow rate, but users who avoid the latest technology upgrade risk missing out on critical security updates.
securityintelligence.webp 2016-12-27 12:55:30 Attacks Targeting Industrial Control Systems (ICS) Up 110 Percent (lien direct) A recent IBM X-Force report found that attacks against industrial control systems (ICS) increased significantly in 2016 over last year's numbers. ★★★★
securityintelligence.webp 2016-12-23 13:15:29 \'In Security\' Web Comic, Episode 004: The Twelve Days of Christmas (lien direct) The Every App team broke out in song to recap a year's worth of cybersecurity challenges in the latest edition of the "In Security" web comic.
securityintelligence.webp 2016-12-23 12:00:25 Health Care Security in 2016: End-of-Year Checkup on Security Trends (lien direct) Upon reviewing the state of health care security in 2016, data revealed that the sector suffered nearly every type of common attack at an increased rate.
securityintelligence.webp 2016-12-22 13:10:26 Attackers Targeting Retail Are Shopping for Low-Hanging Fruit (lien direct) A recent IBM study revealed that many high-profile attacks against retail companies originate from vulnerabilities classified as low-hanging fruit.
securityintelligence.webp 2016-12-22 12:30:24 A Security Professional\'s Cheat Sheet for the Holidays: Hacks, Breaches and More! (lien direct) This list of notable 2016 data breaches can serve as a cheat sheet for a security professional who is pressed for the latest tech news during the holidays.
securityintelligence.webp 2016-12-22 09:30:25 Secure By Design: Antidote for Dynamic Cyberthreats (lien direct) Secure by design requires IT teams to implement security functions into every phase of an application or platform's development.
securityintelligence.webp 2016-12-21 13:35:21 The BYOD Policy Holiday Challenge (lien direct) Many employees are sure to return to work after the holiday with brand new mobile devices, creating a variety of BYOD policy challenges for IT managers.
securityintelligence.webp 2016-12-21 12:40:21 Regulators Want In on the Blockchain Party in 2017 (lien direct) As blockchain appears poised to evolve in 2017, IT managers must work closely with financial regulators to fill any gaps regarding compliance.
securityintelligence.webp 2016-12-21 11:30:24 Adopting PaaS: Tips and Best Practices for Cloud Transformation (lien direct) When adopting PaaS solutions, IT leaders must consider the many security concerns that arise when data is stored and shared using cloud services. Guideline
securityintelligence.webp 2016-12-20 13:45:22 First Day on the Job for a Typical CIO or CISO (lien direct) When starting a new job, the CIO must become intimately knowledgeable about the data within his or her jurisdiction and develop strategies ahead of time.
securityintelligence.webp 2016-12-20 13:00:25 Year in Review: Top Three Cybercrime Threats of 2016 (lien direct) The top three cybercrime threats of 2016 shed some light on what happened in the past 12 months - and what to expect in the year ahead.
securityintelligence.webp 2016-12-20 08:10:25 The Truth I Learned While Online Shopping for Christmas (lien direct) I learned a lot while online shopping for Christmas - including some of the major warning signs signaling false or malicious mobile apps.
securityintelligence.webp 2016-12-19 15:25:21 Financial Services Sector Ends 2016 With a Bang (lien direct) Cybercrime gangs continued to target the financial services sector during the second half of 2016 with a variety of high-profile attacks.
securityintelligence.webp 2016-12-19 12:55:21 Hacked for the Holidays: When You\'re Asked to Fix the Family Computer (lien direct) If you're an IT professional, you'll likely be tapped to fix the family computer this holiday season. Leave your loved ones with these online safety tips.
securityintelligence.webp 2016-12-19 12:10:23 With AI2, Machine Learning and Analysts Come Together to Impress, Part 3: The Experiment (lien direct) Two researchers performed an experiment based on billions of log lines that demonstrated the importance of domain expertise in machine learning analysis.
Last update at: 2024-07-16 16:08:32
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter