Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2017-01-16 11:30:32 |
Too Many Passwords: Is the End in Sight? (lien direct) |
Will passwords become things of the past in 2017? Today, organizations tasked with managing too many passwords are at risk of phishing and malware attacks.
|
|
|
|
|
2017-01-13 13:31:49 |
How to Ensure the Success of a Hot Desking Strategy (lien direct) |
A hot desking strategy allows employees to sit wherever they want, creating more flexibility for workers and more complexity for IT managers.
|
|
|
|
|
2017-01-13 13:00:33 |
The CIO Must Take Charge of the Organization\'s Application Portfolio (lien direct) |
With more businesses turning to SaaS and cloud-based systems, CIOs often lack a proper understanding of the organization's application portfolio.
|
|
|
|
|
2017-01-13 12:00:30 |
Online Services and Hospitality Security Go Hand in Hand (lien direct) |
Online lodging and transportation services offer unprecedented convenience, but their data collection practices have rankled hospitality security experts.
|
|
|
|
|
2017-01-12 13:25:28 |
Charisma Killed the Cat: Fostering an Effective Cybersecurity Leadership Style (lien direct) |
Too much charisma can make for ineffective cybersecurity leadership. CISOs should encourage IT employees to challenge their policies and decision-making.
|
Guideline
|
|
|
|
2017-01-12 12:40:29 |
IP Theft: How Often Does Your IP Walk Out the Door? (lien direct) |
Outgoing employees are motivated by revenge, greed and resentment to abscond with valuable data. A robust exit process is the key to preventing IP theft.
|
|
|
|
|
2017-01-12 11:25:27 |
Protecting Your Staff in Co-Working Spaces (lien direct) |
Co-working spaces can help companies maximize productivity, but they can also introduce security concerns if employees are not trained to connect securely.
|
|
|
|
|
2017-01-11 13:55:27 |
Adopting SaaS: Tips and Best Practices for Cloud Transformation (lien direct) |
Despite its many cost and efficiency benefits, adopting SaaS can introduce new security issues if not managed and tested according to best practices.
|
|
|
|
|
2017-01-11 12:50:28 |
Don\'t Let Remote Management Software Contribute to Building Botnets (lien direct) |
IT leaders must be vigilant when using remote management software. Attackers can exploit these tools to infect devices with malware and build botnets.
|
Guideline
|
|
|
|
2017-01-11 11:50:29 |
Predicting the Top Three Concerns for CISOs in 2017 (lien direct) |
The top concerns for CISOs in 2017 involve aligning with business goals, addressing the IT skills gap and the increasing sophistication of cyberthreats.
|
|
|
|
|
2017-01-10 13:50:29 |
Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data (lien direct) |
All access is not created equal. To protect your crown jewels from an insider threat, it's critical to know your data and, more importantly, your users.
|
|
|
|
|
2017-01-10 12:30:34 |
Client Maximus: New Remote Overlay Malware Highlights Rising Malcode Sophistication in Brazil (lien direct) |
IBM X-Force researchers discovered a new malware called Client Maximus that contains advanced code written specifically to attack banks in Brazil.
|
|
|
|
|
2017-01-10 09:05:28 |
Leapfrog the Skills Shortage and Security Intelligence Challenge With Cognitive Security (lien direct) |
Cognitive security solutions dig through structured and unstructured data to deliver deep insights and patterns and empower CISOs to make better decisions.
|
|
|
|
|
2017-01-09 14:20:30 |
The Pick of 2017 Cybersecurity Conferences (lien direct) |
These 2017 cybersecurity conferences offer educational and networking opportunities for security experts, professionals, enthusiasts and even hackers.
|
|
|
|
|
2017-01-09 12:50:29 |
Bearing Fruit: The Future of Mobile Technology as Apple\'s iPhone Turns 10 (lien direct) |
Mobile technology buffs and analysts are hoping Apple will revolutionize the smartphone market once again 10 years after it released the first iPhone.
|
|
|
|
|
2017-01-09 11:30:28 |
The Four Leading Security Threats of 2017 (lien direct) |
Long-standing security threats such as social engineering are predicted to take on new dimensions in the year ahead.
|
|
|
|
|
2017-01-06 13:40:32 |
Improve Threat Classification Accuracy With Supervised Machine Learning (lien direct) |
Supervised machine learning can free up security analysts to respond to actual threats instead of sifting through endless streams of false positives.
|
|
|
|
|
2017-01-06 12:55:26 |
Move the CSO to a Different Place on the Security Org Chart (lien direct) |
Organizations can improve their ability to enforce security policies and better serve business initiatives by shuffling the security org chart.
|
|
|
|
|
2017-01-06 12:00:28 |
User Behavior Analytics: Perfect for Analysis but Not Security (lien direct) |
User behavior analytics are great for identifying and monitoring cyberthreats, but not for defending or recovering critical assets.
|
|
|
|
|
2017-01-05 17:35:31 |
Android Vulnerabilities: Attacking Nexus 6 and 6P Custom Boot Modes (lien direct) |
X-Force researchers disclosed several Android vulnerabilities that could enable cybercriminals to use custom boot modes to take over Nexus 6 and 6P modems.
|
|
|
|
|
2017-01-05 12:55:26 |
SecOps Revisited: The Challenge of DevOps for Security (lien direct) |
Over the past 18 months, SecOps gained popularity in the developer and consumer communities as cybercriminals increasingly targeted cloud delivery models.
|
|
|
|
|
2017-01-05 11:30:29 |
Using Cognitive Security to Fight the Cybersecurity Borg (lien direct) |
IT teams face a security landscape that is, like the Borg in "Star Trek," persistent and technologically superior. Cognitive security is IT's best hope.
|
|
|
|
|
2017-01-04 14:10:28 |
How Can You Quantify the Value of Automated Provisioning and Deprovisioning? (lien direct) |
IT managers can justify security spending by emphasizing the value of provisioning and deprovisioning to improve the user experience and security policies.
|
|
|
|
|
2017-01-04 13:00:43 |
Exposing AV-Disabling Drivers Just in Time for Lunch (lien direct) |
IBM X-Force researchers discovered malicious AV-disabling drivers while investigating a financial malware campaign targeting Brazilian bank accounts.
|
|
|
|
|
2017-01-04 12:05:25 |
IoT Security: Who Is Stepping Up? (lien direct) |
Government agencies, customers and device manufacturers must develop better IoT security practices to protect the growing number of connected devices.
|
|
|
|
|
2017-01-03 13:31:01 |
The Importance of Building an Information Security Strategic Plan: Part 2 (lien direct) |
The CISO should be the central figure responsible for defining an organization's information security strategic plan and aligning it with business goals.
|
|
|
|
|
2017-01-03 12:55:25 |
Subtlety Is the Danger for Cybercrime Security Efforts (lien direct) |
With threats coming from all sides, it's easy for IT professionals to forget that cybercrime can take many unsophisticated forms.
|
|
|
|
|
2017-01-03 10:10:28 |
Mirror, Mirror: Using Self-Protection to Boost App Security (lien direct) |
The Prevoty QRadar App equips applications with self-protection capabilities and provides analysts with a magic mirror through which to identify threats.
|
|
|
|
|
2017-01-02 11:10:27 |
2017: A New Year\'s Security Resolution (lien direct) |
IT leaders should make a security resolution to improve basic hygiene, back up data regularly and share threat information to fight cybercrime in 2017.
|
Guideline
|
|
|
|
2016-12-30 13:15:26 |
Migrating Security to the Cloud: A Model for Total Cost of Ownership (lien direct) |
When migrating security to the cloud, IT managers must measure the complete total cost of ownership, which includes tangible and intangible costs.
|
|
|
|
|
2016-12-30 12:30:26 |
HIPAA Settlements of 2016: Lessons Learned (lien direct) |
The HIPAA settlements from 2016 reinforce the importance of risk analysis when creating policies and procedures to protect PHI.
|
|
|
|
|
2016-12-29 13:20:27 |
Chip-and-PIN Credit Cards, One Year On (lien direct) |
At the end of 2016, more than a year after the official liability shift, most large retailers in the U.S. have finally adopted chip-and-PIN credit cards.
|
|
|
|
|
2016-12-29 12:35:23 |
BYOD Risks: Should Account Lockout Be Used After Failed Logins? (lien direct) |
For companies with a bring-your-own-device policy, IT managers should create security requirements that address BYOD risks without denting productivity.
|
|
|
|
|
2016-12-28 13:10:26 |
Cloud Security: Are Adopters Asking the Right Questions? (lien direct) |
As providers continue to evolve and differentiate from one another, consumers must ask the right questions when shopping for a cloud security solution.
|
|
|
|
|
2016-12-28 12:15:24 |
Avoiding the Technology Upgrade? Don\'t Dodge Security (lien direct) |
Consumers are buying new devices at a slow rate, but users who avoid the latest technology upgrade risk missing out on critical security updates.
|
|
|
|
|
2016-12-27 12:55:30 |
Attacks Targeting Industrial Control Systems (ICS) Up 110 Percent (lien direct) |
A recent IBM X-Force report found that attacks against industrial control systems (ICS) increased significantly in 2016 over last year's numbers.
|
|
|
★★★★
|
|
2016-12-23 13:15:29 |
\'In Security\' Web Comic, Episode 004: The Twelve Days of Christmas (lien direct) |
The Every App team broke out in song to recap a year's worth of cybersecurity challenges in the latest edition of the "In Security" web comic.
|
|
|
|
|
2016-12-23 12:00:25 |
Health Care Security in 2016: End-of-Year Checkup on Security Trends (lien direct) |
Upon reviewing the state of health care security in 2016, data revealed that the sector suffered nearly every type of common attack at an increased rate.
|
|
|
|
|
2016-12-22 13:10:26 |
Attackers Targeting Retail Are Shopping for Low-Hanging Fruit (lien direct) |
A recent IBM study revealed that many high-profile attacks against retail companies originate from vulnerabilities classified as low-hanging fruit.
|
|
|
|
|
2016-12-22 12:30:24 |
A Security Professional\'s Cheat Sheet for the Holidays: Hacks, Breaches and More! (lien direct) |
This list of notable 2016 data breaches can serve as a cheat sheet for a security professional who is pressed for the latest tech news during the holidays.
|
|
|
|
|
2016-12-22 09:30:25 |
Secure By Design: Antidote for Dynamic Cyberthreats (lien direct) |
Secure by design requires IT teams to implement security functions into every phase of an application or platform's development.
|
|
|
|
|
2016-12-21 13:35:21 |
The BYOD Policy Holiday Challenge (lien direct) |
Many employees are sure to return to work after the holiday with brand new mobile devices, creating a variety of BYOD policy challenges for IT managers.
|
|
|
|
|
2016-12-21 12:40:21 |
Regulators Want In on the Blockchain Party in 2017 (lien direct) |
As blockchain appears poised to evolve in 2017, IT managers must work closely with financial regulators to fill any gaps regarding compliance.
|
|
|
|
|
2016-12-21 11:30:24 |
Adopting PaaS: Tips and Best Practices for Cloud Transformation (lien direct) |
When adopting PaaS solutions, IT leaders must consider the many security concerns that arise when data is stored and shared using cloud services.
|
Guideline
|
|
|
|
2016-12-20 13:45:22 |
First Day on the Job for a Typical CIO or CISO (lien direct) |
When starting a new job, the CIO must become intimately knowledgeable about the data within his or her jurisdiction and develop strategies ahead of time.
|
|
|
|
|
2016-12-20 13:00:25 |
Year in Review: Top Three Cybercrime Threats of 2016 (lien direct) |
The top three cybercrime threats of 2016 shed some light on what happened in the past 12 months - and what to expect in the year ahead.
|
|
|
|
|
2016-12-20 08:10:25 |
The Truth I Learned While Online Shopping for Christmas (lien direct) |
I learned a lot while online shopping for Christmas - including some of the major warning signs signaling false or malicious mobile apps.
|
|
|
|
|
2016-12-19 15:25:21 |
Financial Services Sector Ends 2016 With a Bang (lien direct) |
Cybercrime gangs continued to target the financial services sector during the second half of 2016 with a variety of high-profile attacks.
|
|
|
|
|
2016-12-19 12:55:21 |
Hacked for the Holidays: When You\'re Asked to Fix the Family Computer (lien direct) |
If you're an IT professional, you'll likely be tapped to fix the family computer this holiday season. Leave your loved ones with these online safety tips.
|
|
|
|
|
2016-12-19 12:10:23 |
With AI2, Machine Learning and Analysts Come Together to Impress, Part 3: The Experiment (lien direct) |
Two researchers performed an experiment based on billions of log lines that demonstrated the importance of domain expertise in machine learning analysis.
|
|
|
|