What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2016-11-22 14:30:16 Football and Firewalls: A Winning Game Plan to Improve Network Security (lien direct) Your network security playbook should include an intrusion prevention system (IPS) to detect and respond to threats your firewall misses.
securityintelligence.webp 2016-11-22 13:00:19 The Role of Cognitive Security in Addressing the Incident Response Speed Gap (lien direct) Respondents to an IBV survey identified incident response speed as the most pressing security challenge. Cognitive security tools can close this speed gap.
securityintelligence.webp 2016-11-22 12:30:19 A Year in Collaborative Defense With IBM Security App Exchange (lien direct) Data from the IBM Security App Exchange's first year offers valuable insights into download patterns and the direction of the cybersecurity market overall.
securityintelligence.webp 2016-11-21 13:35:13 It\'s Time for the Democratization of Cybersecurity Data (lien direct) The widespread democratization of cybersecurity data would enable the IT industry to keep up with cybercriminals who always seem to be one step ahead.
securityintelligence.webp 2016-11-21 13:00:17 Gartner IAM Summit and Upcoming Webinars Highlight Identity Governance and Intelligence (lien direct) IBM Security will showcase its identity governance and intelligence solution at the upcoming 2016 Gartner IAM Summit, and during two webinars in December.
securityintelligence.webp 2016-11-21 12:15:14 Protect Sensitive Files With Document Security Management (lien direct) Although most companies have invested in file management tools, document security remains a challenge due to widespread mobile use and BYOD culture.
securityintelligence.webp 2016-11-18 13:55:14 Ninety-Five Percent of Webshell Attacks Written in PHP (lien direct) Webshells are dangerous in the hands of APT groups. According to IBM Managed Security Services (MSS), 95 percent of webshell attacks are written in PHP.
securityintelligence.webp 2016-11-18 13:05:13 Retail Cybersecurity: Black Friday and Cyber Monday Are Upon Us (lien direct) Retail cybersecurity is critical during the holiday season, particularly during the Black Friday and Cyber Monday national shopping events.
securityintelligence.webp 2016-11-18 13:00:16 Cybersecurity Lessons From the 2016 Presidential Election (lien direct) The 2016 presidential election offered many cybersecurity lessons and highlighted the importance of securing all types of data.
securityintelligence.webp 2016-11-17 14:25:14 Getting on the Right Track With a Security Immune System (lien direct) An integrated security immune system can help IT teams cope with the evolving threat landscape that is outpacing traditional solutions.
securityintelligence.webp 2016-11-17 13:31:12 Big Data Solutions Make Big Targets (lien direct) Big data solutions can aggregate, index and analyze many types of data to produce advanced business insights. This makes them juicy targets for fraudsters.
securityintelligence.webp 2016-11-17 09:45:14 Three Ways Effective Cyber Resilience Helps You Stay Cool in Moments of Chaos (lien direct) IBM's new X-Force Command Centers, Cyber Range and IRIS team can help security teams establish an effective cyber resilience strategy.
securityintelligence.webp 2016-11-16 17:00:35 IBM X-Force IRIS: Bringing a New Approach to Incident Response (lien direct) IBM formed the X-Force IRIS team to collaborate with clients to design solutions for today's most challenging cybersecurity issues and threats.
securityintelligence.webp 2016-11-16 16:00:34 Crisis Leadership: The Missing Link in Cyberattack Defense (lien direct) C-suite executives often lack the experience and training required to establish and lead a successful cyberattack defense program. Guideline
securityintelligence.webp 2016-11-15 13:15:33 Using Cognitive Security Solutions to Combat Cyber Scum and Villainy (lien direct) Cognitive security solutions will help IT analysts tackle long-term strategic issues rather than firefighting against the overwhelming volume of threats.
securityintelligence.webp 2016-11-15 12:25:30 The Next Wave of Identity Management Must Meet the Goal of One True Identity (lien direct) The third wave of the internet requires an approach to identity management that recognizes the need to share PII selectively to maximize its value.
securityintelligence.webp 2016-11-15 08:40:32 The Indian IoT Market Is Exploding Despite Gaping Security Holes (lien direct) The rapid growth of the Indian IoT market is encouraging, but more connected devices mean more vulnerabilities for cybercriminals to exploit.
securityintelligence.webp 2016-11-14 14:15:32 Cybercriminals Are Getting Better at Using Advanced Authentication Methods (lien direct) Cybercriminals are becoming more advanced and learning how to leverage the latest authentication methods to exploit security weaknesses.
securityintelligence.webp 2016-11-14 12:50:36 Automated Quality and Application Security Testing, Part 2: Straight Out of the Gate (lien direct) To conduct effective automated quality and application security testing, app developers must test each feature repeatedly at various stages of development.
securityintelligence.webp 2016-11-14 11:40:31 20 Eye-Opening Cybercrime Statistics (lien direct) The many security reports issued this year contain countless cybercrime statistics that should encourage IT professionals and end users to be more careful.
securityintelligence.webp 2016-11-11 13:40:31 Understanding the CIO\'s Role in Security (lien direct) The CIO's role in security includes understanding the company's key vulnerabilities, spreading internal awareness and communicating with top executives.
securityintelligence.webp 2016-11-11 13:05:30 HIPAA, Fines and Your Business Associate Agreement (lien direct) Health care companies must review every business associate agreement to ensure that it aligns with HIPAA requirements and that PHI is properly secured.
securityintelligence.webp 2016-11-11 12:30:32 Security Starts With People: What it Takes to Ensure Simple Yet Strong Authentication on Mobile (lien direct) IT professionals and mobile app developers must figure out a way to implement strong authentication capabilities without complicating the user experience.
securityintelligence.webp 2016-11-10 13:55:31 10 Grid Security Considerations for Utilities (lien direct) It's important to consider factors related to operations and infrastructure, not just threats, when discussing grid security for the utilities industry.
securityintelligence.webp 2016-11-10 13:00:33 Using Layered Security to Keep Warm for the Winter (lien direct) Security teams must implement layered security capabilities to defend against the variety of threats fraudsters launch to capitalize on the holiday bustle.
securityintelligence.webp 2016-11-10 12:40:31 The Rise of the Cashless Society (lien direct) As cryptocurrencies gain traction with banks and consumers, IT professionals must consider the cybersecurity implications of becoming a cashless society.
securityintelligence.webp 2016-11-09 14:15:31 Fantasy League Security Risks Could Spoil a Season (lien direct) The online fantasy sports gaming industry is growing rapidly. Unfortunately, so is the list of fantasy league security risks that threaten users' data.
securityintelligence.webp 2016-11-09 13:00:33 PSD2: Ready, Steady, Go (lien direct) The revised Payments Services Directive (PSD2) is designed to open the online banking and e-commerce markets to new forms of regulated payments.
securityintelligence.webp 2016-11-09 12:25:34 Tricks of the Trade: A Deeper Look Into TrickBot\'s Machinations (lien direct) Researchers discovered a new banking Trojan, TrickBot, that appears to borrow an uncommon webinjection technique from the infamous Dyre family of malware.
securityintelligence.webp 2016-11-08 18:30:34 An Aggressive Launch: TrickBot Trojan Rises With Redirection Attacks in the UK (lien direct) IBM X-Force researchers reported that TrickBot is fully operational and already capable of deploying two of the most advanced browser manipulation methods.
securityintelligence.webp 2016-11-08 13:10:32 Getting Primed to Adopt Cognitive Security Solutions (lien direct) IT professionals are beginning to adopt cognitive security solutions to help them speed up response times and identify threats more effectively.
securityintelligence.webp 2016-11-08 12:40:31 Consequences of IoT and Telnet: Foresight Is Better Than Hindsight (lien direct) Cybercriminals have learned how to exploit the IoT and Telnet servers to commit record-shattering DDoS attacks against major websites.
securityintelligence.webp 2016-11-07 13:50:31 Finding the Right Apps to Streamline Data Collection (lien direct) The IBM Security App Exchange includes over 70 applications to help security teams streamline data collection and share information more efficiently.
securityintelligence.webp 2016-11-07 13:30:53 Automated Quality and Application Security Testing, Part 1: How to Be Agile With Your Agile Adoption (lien direct) Agile adoption enables security professionals to deliver high-quality, secure software and eliminate the pitfalls common to traditional strategies.
securityintelligence.webp 2016-11-07 13:00:33 Five Easy Pieces: How Machine Learning Is Already Boosting Cybersecurity (lien direct) IT professionals are turning to machine learning solutions to help them reduce the rate of false positives and monitor huge volumes of data in real time.
securityintelligence.webp 2016-11-04 14:00:53 The Internet of Trouble: Securing Vulnerable IoT Devices (lien direct) In the past few months, researchers have observed large-scale DDoS attacks that leverage vulnerable IoT devices to create massive botnets.
securityintelligence.webp 2016-11-04 13:50:35 How to Add User-Defined AQL Functions in QRadar (lien direct) IT professionals can leverage user-defined AQL functions in QRadar to perform complex calculations and analyze data retrieved from the Ariel databases.
securityintelligence.webp 2016-11-04 13:40:31 It Only Has to Happen Once: Protecting Your Brand in the Digital Age (lien direct) The challenge of protecting your brand is growing as ransomware and other targeted attacks become increasingly frequent and complex.
securityintelligence.webp 2016-11-03 12:39:01 Cognitive Security to the Rescue? Study Predicts Widespread Adoption in the Next Few Years (lien direct) According to a recent survey conducted by the IBM Institute of Business Value (IBV), the era of cognitive security may be coming sooner than we think.
securityintelligence.webp 2016-11-03 11:31:05 Changing of the Guard: Three Considerations for Your Next IPS Purchase (lien direct) Recent changes in the security market have influenced many IT professionals to focus on the long-term success of their programs when shopping for an IPS.
securityintelligence.webp 2016-11-02 14:13:37 Windows 10: Here to Stay in a Big Way (lien direct) With Windows 10, Microsoft sought to make the tools employees have grown to love compatible with the smartphones and tablets they prefer to use on the go.
securityintelligence.webp 2016-11-02 12:35:15 Seasonal Employee Security Risks: Present Danger, Proactive Defense (lien direct) Companies that enlist extra help during the holidays must carefully vet temporary hires and restrict access to manage seasonal employee security risks. ★★
securityintelligence.webp 2016-11-02 09:48:15 The Art and Science of How Spam Filters Work (lien direct) Few truly understand how spam filters work, but nearly every internet user benefits from the security they provide on a daily basis.
securityintelligence.webp 2016-11-01 19:21:22 Lessons From the Dyn DDoS Attack (lien direct) Domain name provider Dyn suffered the largest DDoS attack in history on Oct. 21. DDoS is nothing new, but the attack highlights some alarming trends.
securityintelligence.webp 2016-11-01 19:15:32 Vulnerability Management: Do You Know Your Risks? (lien direct) Vulnerability management is a critical part of any security program, but many IT professionals fail to realize that it starts with risk management.
securityintelligence.webp 2016-11-01 10:30:53 Track Relevant Vulnerabilities With Watchlists (lien direct) The watchlist feature on IBM X-Force Exchange enables network administrators to maintain accurate asset inventories and track relevant vulnerabilities.
securityintelligence.webp 2016-10-31 14:47:17 Seven Ways to Optimize Your Application Security Testing Program (lien direct) Organizations often neglect to perform adequate application security testing due to concerns about timing, budget, expertise and resource constraints.
securityintelligence.webp 2016-10-31 14:08:28 Online Safety Tips for NCSAM: Lessons From Week Four (lien direct) October has flown by! National Cyber Security Awareness Month (NCSAM) may soon be over, but these cybersecurity lessons are evergreen.
securityintelligence.webp 2016-10-31 10:35:43 Machine Learning: When It Works and When It Doesn\'t (lien direct) Machine learning is an invaluable analytical tool, but problems can arise from its inability to reason beyond the scope of its classification algorithms.
securityintelligence.webp 2016-10-28 12:47:23 Black Hat Europe 2016: Can Hacking Be Considered Entrepreneurial? (lien direct) Information sharing is key to the success of the cybersecurity industry. Learn more about ethical hacking and bug bounty programs at Black Hat Europe 2016.
Last update at: 2024-07-16 16:08:32
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter