Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-16 13:31:25 |
2016: The Year of the DDoS Attack (lien direct) |
In 2016, the year of the DDoS attack, cybercriminals hijacked millions of IoT devices to create massive botnets they used to take down popular websites.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-16 13:00:24 |
10 Application Security Testing Resources You Should Master and Share With Your Executive Team in 2017 (lien direct) |
IT managers should review, master and share these 10 application security testing resources to stay ahead of the rapidly evolving threat landscape in 2017.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-16 10:30:22 |
GDPR Compliance Regulations: The New Challenge for the Cloud Operations Manager (lien direct) |
Companies around the world must review the processes by which they collect and store personal data to prepare for the upcoming GDPR compliance regulations.
|
|
|
★★
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-15 16:15:21 |
Employ Enterprise Security Collaboration to Blunt Cyber Risks (lien direct) |
Enterprise security collaboration is critical to protecting valuable business data. IT managers should consult executives and train them on cyberthreats.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-15 13:25:19 |
Fighting Advanced Ransomware Attacks Requires Game-Changing Technology (lien direct) |
As ransomware attacks become more advanced, Resilient's Dynamic Playbooks enable IT professionals to more effectively prepare for and respond to incidents.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-15 12:00:23 |
Insider Threats, Industrial Sabotage and Game Theory, Part 3: Multiplayer Games (lien direct) |
Organizations seeking to prevent insider threats should establish red, blue and black teams to produce threat models for multiplayer games.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-14 22:05:19 |
Turn Scrap Paper Into Security Investigations With IBM X-Force Threat Intelligence (lien direct) |
IBM added a Collections feature to its X-Force Exchange that enables researchers to share reports and engage in collaborative defense.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-14 13:50:21 |
Five Signs of CISO Complacency (lien direct) |
CISO complacency can lead to anxiety and ambiguity, which can erode team morale and cause IT departments to miss important details with no accountability.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-14 13:10:22 |
How Can You Quantify the Value of Web Access Enforcement? (lien direct) |
Each business is responsible for establishing its own system for evaluating web access enforcement based on the particular needs of the organization.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-14 11:00:23 |
Ransomware Report: Top Security Threat Expected to Continue Rising in 2017 (lien direct) |
To pay or not to pay? When it comes to ransomware, that is the question. Despite a rise in attacks, organizations are largely unaware of the threat.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-13 22:00:24 |
NÇ HÇŽo TrickBot? Dyre Successor Spreads to Asia (lien direct) |
The cybergang behind the TrickBot Trojan has moved into Singapore, targeting the many multinational corporations that operate in the region.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-13 12:35:23 |
Flying With the Wind: Reduce Drag on Your Data Protection Program With Automation and Visualization (lien direct) |
Automation and analytics can help IT professionals speed up and solidify their data protection programs and prepare for regulatory audits.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-13 11:55:18 |
Making a SIEM Dance With Docker (lien direct) |
IBM added Docker containerization technology to its QRadar SIEM platform to provide the agility, stability and robustness needed to fight evolving threats.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-12 13:15:22 |
Secure Your IoT Deployment by Paying Attention to These Four Factors (lien direct) |
It has never been more important to secure your IoT deployment. Challenges include lack of visibility, inexperience and the IoT's increasing complexity.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-12 12:10:21 |
Is Bluetooth Security Good Enough for Your Most Sensitive Corporate Communications? (lien direct) |
Bluetooth security is not strong enough to keep fraudsters from eavesdropping on sensitive communications. The upcoming Bluetooth 5 offers enhancements.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-12 11:35:19 |
With AI2, Machine Learning and Analysts Come Together to Impress, Part 2: The Algorithms (lien direct) |
AI2 uses an "analyst-in-the-loop" system to improve itself and a "human-in-the-loop" system to create examples to be used in iterative training algorithms.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-09 14:20:20 |
Avoiding Threat Management Rookie Mistakes (lien direct) |
Two recent cyberattacks against global companies and services demonstrated the need for better threat management practices and awareness.
|
|
|
★★★
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-09 13:00:39 |
Augmented Intelligence: Making the Case for Cognitive Security (lien direct) |
Augmented intelligence solutions enable security analysts to examine previously unthinkable amounts of data with the helps of cognitive technology.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-09 12:15:18 |
The U.S. Federal CISO and His First 100 Days (lien direct) |
The new federal CISO will work with organizations and advocates in the government and private sectors to devise an overarching U.S. cybersecurity strategy.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-08 16:40:19 |
Save Time by Accessing Multiple Threat Intelligence Streams at Once (lien direct) |
IBM created an external threat feed manager to work with the threat intelligence services and partnerships available in the X-Force Exchange.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-08 12:55:17 |
How to Find and Remediate Vulnerabilities in Real Time (lien direct) |
IT managers should take advantage of the many resources available to help them monitor, manage and ultimately remediate vulnerabilities.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-08 11:40:19 |
Behind the Scenes at a Capture the Flag (CTF) Competition (lien direct) |
A CTF competition can help an IT expert, student or budding cybersecurity enthusiast develop new skills and knowledge in a safe, competitive environment.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-07 13:30:22 |
For Science! Steps for Safe Volunteer Computing (lien direct) |
The old adage that "time is money" is proven once again when it comes to volunteer computing. Here's what you need to know before signing onto a project.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-07 13:00:36 |
Rising Attack Rates and Massive Breaches Plague Government Organizations (lien direct) |
IBM's "2016 Cyber Security Intelligence Index" reported that the government sector is now the fourth most frequently targeted industry in the U.S.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-07 11:35:17 |
Stranger Than Fiction? The Six Weirdest 2016 Data Breaches (lien direct) |
The list of notable 2016 data breaches is long and wacky. Cybercriminals compromised food delivery apps, FBI databases and seemingly everything in between.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-06 13:20:25 |
Pivoting Toward Cognitive Security: Benefits and Challenges (lien direct) |
Many organizations are adopting cognitive security solutions to boost response speed, security intelligence and accuracy, while others are lagging behind.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-06 12:40:18 |
Real-Time Payments, Real-Time Fraud Risks? (lien direct) |
Programs such as NACHA's Faster Payments initiative may help U.S. businesses become more competitive, but shorter transaction times lead to fraud risks.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-06 10:35:17 |
Best Practices for Selecting a Managed Security Services Provider for Organizations in Asia-Pacific (lien direct) |
As IT managers in Asia-Pacific continue to struggle with a skills gap, it's more critical than ever to choose the right managed security services provider.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-05 13:45:18 |
Security Starts With People: Three Steps to Build a Strong Insider Threat Protection Program (lien direct) |
To protect their organizations from an insider threat, IT managers should take steps to reduce exposure of data and enhance detection capabilities.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-05 13:00:21 |
The Power of Network Insights: Nowhere for Threats to Hide (lien direct) |
IBM QRadar Network Insights enables security professionals to analyze historical threat data and identify indicators of malicious activity in real time.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-05 12:25:17 |
With AI2, Machine Learning and Analysts Come Together to Impress, Part 1: An Introduction (lien direct) |
Machine learning systems like A12 are designed to augment human analysis with cognitive intelligence, enabling IT professionals to reduce false positives.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-02 13:35:19 |
The Threat Model of 2017 (lien direct) |
If a threat model assumes a system is operating within certain parameters, changes in the threat environment could trigger unintended second-order effects.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-02 13:35:16 |
Is Your Security Intelligence Solution Stuck in the Past? (lien direct) |
IT security managers should bet on a security intelligence solution that can be installed quickly and offers speedy, reliable support.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-02 12:00:24 |
Detect Endpoint Threats by Analyzing Process Logs in QRadar (lien direct) |
Using an SIEM solution such as QRadar, security professionals can analyze process logs to detect, hunt and trace the source of threats.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-01 13:00:21 |
Mirai Evolving: New Attack Reveals Use of Port 7547 (lien direct) |
Cybercriminals recently discovered how to modify the Mirai botnet source code, which leaked in September, to compromise devices remotely via TCP port 7547.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-01 12:05:16 |
MSS Offerings: Looking Under the Hood (lien direct) |
IT managers should consider a provider's quality of SOC staffing, flexibility and ability to meet business objectives when comparing MSS offerings.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-12-01 09:00:18 |
Don\'t Blink! TrickBot Now Targets 10 German Savings Banks (lien direct) |
IBM X-Force researchers reported that the TrickBot banking Trojan added new attack capabilities designed to target savings banks in Germany.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-11-30 14:25:15 |
Five Cybersecurity Challenges Facing Financial Services Organizations Today (lien direct) |
Financial services companies faces a growing number of evolving cybersecurity challenges, including countless regulations and rising customer expectations.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-11-30 13:00:22 |
Hello, You\'ve Been Compromised: Upward Attack Trend Targeting VoIP Protocol SIP (lien direct) |
According to IBM Managed Security Services data, cybercriminals most commonly target the SIP and SCCP protocols in VOIP spam attacks.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-11-30 11:05:15 |
Cybersecurity Meets Gamification at CTF Competitions (lien direct) |
CTF competitions offer a closed arena for IT amateurs and experts to build and exercise their cybersecurity skills - and have a little fun along the way.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-11-29 13:00:20 |
Security Starts With People: Know Who They Are, Know What They Do (lien direct) |
Technology is great, but security starts with people. The best way to prevent a data breach is to know the people in your organization and what they do.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-11-29 12:10:18 |
Cognitive Security Key to Addressing Intelligence and Accuracy Gaps (lien direct) |
Cybersecurity leaders hope to use cognitive security solutions to improve detection and incident response capabilities and reduce false positives.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-11-29 07:30:18 |
Where Are We on Cybersecurity in India? (lien direct) |
The state of cybersecurity in India has been shaky during the country's rapid digitization, but companies are learning how to better prepare for incidents.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-11-28 15:20:18 |
Don\'t Fall for an Imperfect Data Security Solution (lien direct) |
Organizations that fall for hollow sales pitches for imperfect data security solutions risk leaving their valuable assets vulnerable to cybertheft.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-11-28 12:40:16 |
Access Management Resolution in the Digital Era (lien direct) |
As organizations continue to embrace the digital era and cloud services, it's more important than ever to find an access management resolution.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-11-28 10:35:16 |
In 2017, Blockchain Gets Serious (lien direct) |
Formerly only associated with cryptocurrencies such as Bitcoin, blockchain technology will come of age in 2017, yielding use cases across industries.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-11-23 16:30:18 |
TrickBot Redirection Attacks Launched in Canada (lien direct) |
TrickBot has developed new attack methods specifically designed to target banks in Canada in addition to its established targets in the U.K. and Australia.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-11-23 13:10:21 |
\'In Security\' Web Comic, Episode 003: To the Command Center (lien direct) |
The Every App team visits the IBM X-Force Command Center to see what can be done about Pandapocalypse. Can the Cyber Range help improve their response?
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-11-23 12:30:16 |
IT and Business Leaders Collaborate to Protect Critical Data (lien direct) |
It takes a collaborative effort between IT and business leaders to protect critical data from cybercriminals and sustain a competitive advantage.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2016-11-23 11:45:15 |
Travel Security Tips for Personal and Business Trips (lien direct) |
Before leaving for a business trip, be sure to keep these basic travel security tips in mind to keep your data safe from local adversaries.
|
|
|
|