What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2016-10-28 12:46:24 Questions Every CIO Should Ask the Cybersecurity Leader: Part 3 (lien direct) The cybersecurity leader and CIO must collaboratively address 10 common risk management controls to protect the organization's most sensitive data. Guideline
securityintelligence.webp 2016-10-27 09:45:42 Outsmarting Fraudsters With Cognitive Fraud Detection (lien direct) Cognitive fraud detection technology enables banks to enhance mobile security without diminishing the seamless user experience customers demand.
securityintelligence.webp 2016-10-27 09:35:41 New Security Enhancements for Microsoft Windows Server 2016 (lien direct) Windows Server 2016 includes enhanced security features, such as VM encryption capabilities and a minimal Nano Server to reduce the attack surface.
securityintelligence.webp 2016-10-27 09:30:21 Gartner IAM Summit 2016: Your Ultimate Guide to Must-Attend Sessions and Much More (lien direct) The 2016 Gartner IAM Summit is just around the corner. Check out the jam-packed agenda and view the cloud IAM video that could help you earn free swag.
securityintelligence.webp 2016-10-26 12:33:45 10 Cybersecurity Lessons From 10 Years\' Experience at IBM (lien direct) IBM Security Director of strategy and product design Kevin Skapinetz shared 10 cybersecurity lessons he picked up in his decade of experience in IT.
securityintelligence.webp 2016-10-26 12:03:10 Clearing the Fog: Defining the Fundamental IAM Domains (lien direct) The use of identity and access management is widespread, but the IT industry still lacks a consistent set of definitions for the fundamental IAM domains.
securityintelligence.webp 2016-10-26 10:56:03 Preparing for the Next Era of Computing With Quantum-Safe Cryptography (lien direct) The race is on to devise an effective method of quantum-safe encryption to cope with the security implications of this emerging technology.
securityintelligence.webp 2016-10-25 12:35:17 Mobile Payments: Should Security Overshadow Convenience? (lien direct) The mobile payments market is booming as consumers and merchants increasingly adopt new technology. With convenience, however, come new security concerns.
securityintelligence.webp 2016-10-25 11:14:50 The Role of the CISO and Information Security in the Construction Industry (lien direct) Many companies fail to recognize the importance of information security in the construction industry. A CISO or CIO is critical to lead security efforts. Guideline
securityintelligence.webp 2016-10-25 09:52:02 Global City CIOs Launch New Organization to Promote Best Smart City Practices (lien direct) A group of IT leaders from around the world formed the Council of Global City CIOs to promote information sharing when it comes to smart city initiatives. Guideline
securityintelligence.webp 2016-10-24 13:27:22 GM Bot: Alive and Upgraded, Now on Android M (lien direct) Researchers discovered a new version of banking Trojan GM Bot that enables cybercriminals to bypass security features included with Android Lollipop.
securityintelligence.webp 2016-10-24 12:50:21 Learn How to Protect Yourself From Yourself With Identity Governance and Intelligence (lien direct) An effective identity governance and intelligence solution enables IT leaders to manage and monitor the levels of access granted to each individual user. Guideline
securityintelligence.webp 2016-10-24 12:19:09 Online Safety Tips for NCSAM: Lessons From Week Three (lien direct) Have you become smarter about cybersecurity during National Cyber Security Awareness Month? Adding to our previous tips, here are seven more NCSAM lessons.
securityintelligence.webp 2016-10-21 12:57:52 Researchers Detect Second Wave of Shellshock Attacks Since Two-Year Anniversary (lien direct) Researchers detected an increase in Shellshock attacks - the second wave of activity since the malware celebrated its two-year anniversary in September.
securityintelligence.webp 2016-10-21 12:56:03 Questions Every CIO Should Ask the Cybersecurity Leader: Part 2 (lien direct) When it comes to building a secure IT program, the CIO must ask the cybersecurity leader the right questions to devise an effective incident response plan. Guideline
securityintelligence.webp 2016-10-20 13:04:51 Mainframe Security: An Easy and Intuitive Access Security Model (lien direct) Mainframe security is easier to understand and more intuitive to implement than many IT professionals think. A simple model can protect against any attack.
securityintelligence.webp 2016-10-20 12:23:34 Forrester Study Highlights a Company\'s 90 Percent Reduction in Fraud Costs Using IBM Trusteer Solutions (lien direct) A Forrester study found that IBM Trusteer solutions can help companies drastically reduce malware incidents, regulatory fines and time spent on auditing.
securityintelligence.webp 2016-10-20 10:41:38 Insider Threats, Industrial Sabotage and Game Theory: Part 2 (lien direct) When it comes to securing industrial IT environments, the implications of game theory vary depending on whether the parties cooperate, collude or defect.
securityintelligence.webp 2016-10-19 12:06:11 Behavior Analytics: The Right Ingredient to Combat Insider Threats (lien direct) Cybersecurity threats come from all sides - even from within the network. Behavior analytics empowers IT teams with full visibility across the IT ecosystem.
securityintelligence.webp 2016-10-19 11:19:33 Reduce the Noise of Threat Intelligence (lien direct) A properly implemented threat intelligence feed can help security analysts distinguish between white noise and potentially harmful traffic on the network.
securityintelligence.webp 2016-10-18 12:54:55 The Role of the CISO of a CSP (lien direct) The CISO of a CSP is crucial to the security of any cloud environment. Many providers, however, rely on the limited expertise of a CTO for IT security.
securityintelligence.webp 2016-10-18 12:14:27 Data Breaches and the Importance of Account Protection and Incident Response (lien direct) Data breaches can be devastating to an organization. Defense against data breaches starts and ends with account protection and incident response.
securityintelligence.webp 2016-10-18 10:28:03 The Case for IAM: Three Reasons to Develop Your IAM and Authentication Practices (lien direct) Most professionals grasp the importance of user authentication, but few recognize the benefit of using IAM and authentication as a standalone authority.
securityintelligence.webp 2016-10-17 13:26:12 Machine Learning for Threat Analytics: A Boost or a Bust? (lien direct) Machine learning relies on data acquisition and classification of examples to help security teams and threat analysts reduce the rate of false positives.
securityintelligence.webp 2016-10-17 13:13:08 (Déjà vu) Online Safety Tips for NCSAM: Lessons From Week Two (lien direct) If you've mastered the tips the EveryApp team offered last week to celebrate National Cyber Security Awareness Month, here are seven more NCSAM lessons.
securityintelligence.webp 2016-10-14 12:43:55 Questions Every CIO Should Ask the Cybersecurity Leader: Part 1 (lien direct) Many organizations lack an efficient risk prioritization strategy. A healthy transformation requires cooperation between the CIO and cybersecurity leader. Guideline ★★
securityintelligence.webp 2016-10-14 12:23:04 Intelligent Finding Analytics: Your Cognitive Computing Application Security Expert (lien direct) IBM's Intelligent Finding Analytics platform enables security teams using SAST solutions to deliver results more accurately to developers for speedy fixes.
securityintelligence.webp 2016-10-13 12:37:45 How Will the Internet of Things Be Leveraged to Ruin Your Company\'s Day? Understanding IoT Security (lien direct) The Internet of Things is here to stay. Despite the market's rapid growth and the high level of risk, many companies still neglect IoT security.
securityintelligence.webp 2016-10-13 12:10:32 Company Security Policies and Reading the Fine Print (lien direct) Company security policies are usually long, convoluted and filled with jargon. This discourages users from reading the all-important fine print.
securityintelligence.webp 2016-10-12 13:08:22 Adopting IaaS: Tips and Best Practices for Cloud Transformation (lien direct) Many organizations are choosing to adopt cloud and hybrid cloud architectures to integrate with infrastructure-as-a-service (IaaS) solutions.
securityintelligence.webp 2016-10-12 12:49:49 Tough Challenges in Cybersecurity Ethics (lien direct) Without a standardized, consistent code of cybersecurity ethics, professionals throughout the industry struggle to distinguish right from wrong.
securityintelligence.webp 2016-10-12 12:42:31 For Enterprise Security, Disruption Doesn\'t Have to Be Disruptive (lien direct) Disruption can be productive when it comes to enterprise security. Disruptive technologies prompt established players to adapt and improve their services.
securityintelligence.webp 2016-10-11 13:30:19 The Role of the CISO and Information Security in Professional Sports (lien direct) The implications of information security in professional sports go way beyond X's and O's. Still, many organizations lack a CISO to oversee data security.
securityintelligence.webp 2016-10-11 13:27:28 GDPR Readiness: From Mission Impossible to Mission Accomplished (lien direct) GDPR readiness starts with a solid understanding of what Personal Data looks like, where it is located, who is accessing it and who wants to compromise it.
securityintelligence.webp 2016-10-11 12:55:46 The Pros of Attending Cons: Why Conferences Offer the Best Security Education Opportunities (lien direct) Cybersecurity conferences can be expensive and require months of planning and lots of travel, but the security education benefits far outweigh the costs.
securityintelligence.webp 2016-10-10 13:17:03 Unleash the Power of Data, Analytics and Machine Learning at World of Watson 2016 (lien direct) Learn how to leverage the benefits of big data and machine learning without compromising critical data at World of Watson 2016.
securityintelligence.webp 2016-10-10 13:08:53 Online Safety Tips for NCSAM: Lessons From Week One (lien direct) In the spirit of National Cyber Security Awareness Month (NCSAM), the EveryApp team offers seven basic tips for online safety.
securityintelligence.webp 2016-10-10 12:58:24 Threat Monitoring Alerts in the Night: Is Anybody Watching? (lien direct) Threat monitoring is an essential practice for any security program, but there are many approaches that can be taken when embracing this strategy.
securityintelligence.webp 2016-10-07 12:56:43 ASN.1 Compiler Causes a Network Vulnerability (lien direct) Researchers discovered a flaw in the ASN1C compiler produced by Objective Systems, Inc. It could lead to a dangerous network vulnerability. Guideline
securityintelligence.webp 2016-10-07 12:54:33 National Cyber Security Awareness Month: Attestations and Certifications (lien direct) This National Cyber Security Awareness Month, security leaders should examine their IT environments with respect to SSAE-16 and ISO 27001 standards. Guideline
securityintelligence.webp 2016-10-06 14:12:07 Talent Acquisition Marketing: Showcasing Your Brand to Score Security Standouts (lien direct) Talent acquisition marketing is essential for security teams struggling to deal with the ever-widening worldwide cybersecurity skills gap.
securityintelligence.webp 2016-10-06 11:55:58 Malvertising: Coming to a Website Near You (lien direct) Advertising enables free content. Without online advertising, many publishers would be forced to charge users through subscriptions or other methods of payment to view their content. On the flip side, it’s a way for companies to promote new services, products and discounts. But advertising is also becoming increasingly attractive to cybercriminals as a vehicle for […]
securityintelligence.webp 2016-10-06 08:58:09 Identity and Blockchain: Pseudo-Anonymous Bitcoin Versus Trusted Participant (lien direct) Since its creation, blockchain has risen in popularity among security experts and the public. It has even been touted as the silver bullet of cybersecurity, unbreachable and safe. But viewing blockchain in that light is overly simplistic. To maximize its usefulness, specifically for the enterprise, blockchain as a technology must evolve to embrace identity and […]
securityintelligence.webp 2016-10-05 13:30:27 \'In Security\' Web Comic, Episode 002: In the Boardroom (lien direct) The EveryApp team learned that ransomware and other types of malware are no longer singular forces. This demands an integrated approach to cybersecurity.
securityintelligence.webp 2016-10-05 11:52:34 Why Do We Care So Little About Application-Layer Protection? (lien direct) In the current world of cloud and agile development, we deliver code monthly, weekly and even daily. One of my engineering teams at IBM affectionately refers to updates as the “daily dose.” We have developed robust processes to ensure that these updates are seamless and impact production minimally. But one of the major challenges is […]
securityintelligence.webp 2016-10-05 10:31:48 Coffee Break With Colleagues? Cream, Sugar and Two Spoonfuls of IoT Security (lien direct) When you huddle around the coffee machine at work or flip on your smart kettle at home, do you consider the security of the Internet of Things (IoT) devices you are using? If you’re like most, IoT security is probably the last thing on your mind. Today it is more and more likely that these […]
securityintelligence.webp 2016-10-04 13:01:57 Redefining Digital Interactions in Asia-Pacific With Blockchain Technology (lien direct) Widespread adoption of blockchain technology could help Asia-Pacific countries streamline ineffective processes related to logistics, trade and more.
securityintelligence.webp 2016-10-04 13:00:15 Facebook Messenger Encryption: Thumbs Up for Enterprise Messaging? (lien direct) The enterprise messaging revolution has come and gone. Enterprise messaging today simply stands as an embedded force driving business. Real-time communication for fast answers, calendar syncing, vivid video meetings and collaboration for seamless revisions don’t simply homogenize past tools - they also revolutionize them. While some still consider enterprise message platforms, such as Slack and […]
securityintelligence.webp 2016-10-04 12:58:58 The Role of the CISO for Law Firms (lien direct) This is the first installment in a four-part series about industry CISOs. Be sure to check back next week for the second chapter. Any effective information security program has a dedicated professional in charge. This person is usually the chief information security officer (CISO). I can’t think of many sectors where having a CISO would […]
securityintelligence.webp 2016-10-03 14:27:24 How Can the Tale of the Elephant and the Blind Men Help You Prepare for the GDPR? (lien direct) IT teams can refer to the tale of the elephant and the blind men when preparing for the GDPR. They must understand each element to ensure total compliance.
Last update at: 2024-07-16 16:08:32
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter