What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2017-03-03 12:05:40 Abuse of Privileges: Common Barriers to Managing Privileged Accounts (lien direct) Companies often face challenges related to shared IDs, third-party access, regulatory compliance and privilege creep when managing privileged accounts.
securityintelligence.webp 2017-03-02 13:50:41 Nine Security Tips That Go Outside the Box (lien direct) Even the most basic security measures can go a long way toward thwarting cybercrime. Use these simple yet effective security tips to protect your network.
securityintelligence.webp 2017-03-02 12:40:46 \'In Security\' Web Comic, Episode 006: The Great Dawnack (lien direct) In this installment of "In Security," the Great Dawnack's crystal ball depicted a troubling future for companies battling increasingly advanced threats.
securityintelligence.webp 2017-03-02 11:10:44 Prepared for the GDPR? Top 10 Findings From Hurwitz & Associates Survey (lien direct) A recent Hurwitz & Associates survey revealed that while general awareness about the GDPR is high, many companies are unprepared to meet the deadline.
securityintelligence.webp 2017-03-01 13:35:40 Viva Las Vegas, and Viva Effective Application Security Testing Practices! (lien direct) At IBM InterConnect, attendees will learn how to apply cognitive solutions to keep their application security testing programs one step ahead of threats.
securityintelligence.webp 2017-03-01 13:00:52 GootKit Developers Dress It Up With Web Traffic Proxy (lien direct) X-Force researchers revealed the cybergang behind Gootkit had upgraded the banking Trojan with new network interception and certificate bypass methods.
securityintelligence.webp 2017-03-01 12:25:39 Your IBM i Holds Your Crown Jewels. What Are You Doing to Protect Them? (lien direct) As threats become more advanced, it's increasingly critical for security teams to proactively monitor what's happening within and outside of IBM i.
securityintelligence.webp 2017-02-28 16:55:40 How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability (lien direct) It's critical to protect sensitive cloud-based data using encryption while it is being stored, and to delete it securely at the end of its life cycle.
securityintelligence.webp 2017-02-28 15:55:40 Watson Proves a Fast Learner in Cybersecurity Test Run (lien direct) Watson proved to be a fast learner during its test run in the Smarttech SOC, eventually becoming a trusted adviser to the team's analysts.
securityintelligence.webp 2017-02-28 13:00:52 Dridex\'s Cold War: Enter AtomBombing (lien direct) IBM X-Force researchers discovered that an upgraded version of Dridex has been using a new injection method, signifying the Trojan's continued evolution.
securityintelligence.webp 2017-02-27 13:30:48 Mobile Mania! IBM MaaS360 Unveils New Benchmarks and Security Index (lien direct) The IBM MaaS360 team released its Mobile Metrics report to kick off Mobile World Congress and illustrate the state of the ever-shifting mobile landscape.
securityintelligence.webp 2017-02-27 13:00:45 IBM Is a Leader, Again, in the 2017 Gartner Magic Quadrant for IGA (lien direct) IBM Security was named a Leader in the recently published "2017 Gartner Magic Quadrant for IGA" for the third consecutive year. Guideline
securityintelligence.webp 2017-02-27 12:20:42 Govern Your API Banking Environment (lien direct) As the financial services landscape increasingly shifts toward digital solutions, it is more crucial than ever to secure API banking environments.
securityintelligence.webp 2017-02-24 13:50:40 Cybersecurity Regulations Get Demanding (lien direct) CISOs must closely monitor their companies' business transactions to maintain compliance with the growing number of international security regulations.
securityintelligence.webp 2017-02-24 12:45:39 Making the Move to an All-HTTPS Network (lien direct) There are countless benefits to moving web infrastructure to support the HTTPS protocol, but it's not as simple as swapping one protocol for another.
securityintelligence.webp 2017-02-24 11:50:40 The First Rule of Security Club: Don\'t Talk About Security (lien direct) The first rule about Security Club is don't talk about security - or, at least, don't let security initiatives get in the way of delivering business value.
securityintelligence.webp 2017-02-23 13:40:40 Connecting the Dots With the IBM Cognitive SOC and Watson for Cyber Security (lien direct) With IBM's Cognitive SOC and Watson for Cyber Security, analysts can detect and respond to incidents that traditional threat intelligence platforms miss.
securityintelligence.webp 2017-02-23 13:00:42 Gartner IAM Summit London 2017: Your Guide to the Swag and Must-Attend Sessions (lien direct) At this year's Gartner IAM Summit, attendees will learn how to leverage IAM-as-a-service and actionable intelligence to prevent insider attacks and more.
securityintelligence.webp 2017-02-23 12:15:40 The Best Defense Is a Good Offense: The Value of User Education (lien direct) User education and online safety training can be invaluable weapons against cyberthreats, especially for IT teams that are short on resources.
securityintelligence.webp 2017-02-23 08:03:24 National Security Requires Real-Time Endpoint Compliance (lien direct) Federal agencies need to implement a continuous management solution to remain in compliance and prevent cyberthreats from compromising national security.
securityintelligence.webp 2017-02-22 13:50:41 Time to End the Tension Between Corporate Remediation and Security Teams (lien direct) Although remediation and security teams are working toward a common goal, their conflicting priorities, culture and tools often lead to discord. Guideline
securityintelligence.webp 2017-02-22 13:00:44 The Disconnected Digital World (lien direct) As we continue our transformation into a digital world, IT leaders must find ways to resolve disconnects related to communication, policy, tools and more. Guideline
securityintelligence.webp 2017-02-22 11:45:40 Adaptive Security: The Safety Net in the Flying Trapeze Act (lien direct) IT leaders should use adaptive security solutions as a safety net to protect user, customer and corporate data from fraudsters. Guideline
securityintelligence.webp 2017-02-21 16:30:42 RSA Wrap-Up: Top Stories From the 2017 RSA Conference (lien direct) For our RSA wrap-up, we summarized some key points and takeaways about emerging trends such as the IoT, security analytics and the IT skills shortage.
securityintelligence.webp 2017-02-21 13:15:41 Disposing of Your Device: Don\'t Throw the Data Out With the Old PC (lien direct) Disposing of your device securely means wiping old data, deauthorizing account access and finding an ecologically sound home for the old device.
securityintelligence.webp 2017-02-21 12:10:40 IAM Feeling Good? What CISOs Should Know About the Feeling of Identity and Access Management Solutions (lien direct) Identity and access management (IAM) is critical, but an inconvenient authentication process makes for a lousy user experience.
securityintelligence.webp 2017-02-20 13:40:39 Shadow IT Comes of Age (lien direct) Harnessing shadow IT starts with security leaders. IT and security teams must work together to identify problem areas and provide quality solutions. Guideline
securityintelligence.webp 2017-02-20 12:55:38 Can You Inoculate Your Organization Against Cybercrime? (lien direct) A cybersecurity immune system can "inoculate" your organization against attacks by ingesting and using the latest threat intelligence.
securityintelligence.webp 2017-02-20 11:35:38 Blurred Lines: Make Security Personal (lien direct) IT managers must make security personal to encourage employees in their organizations to adopt better security practices and improve their online hygiene.
securityintelligence.webp 2017-02-17 19:00:42 An IoT Love Story: Always Apart, Never Disconnected (lien direct) Connected devices are beginning to change ownership for the first time, which presents new IoT security challenges for manufacturers.
securityintelligence.webp 2017-02-17 13:00:42 RSA Tips for CISOs: From 10 Years Ago to Today (lien direct) CISOs struggling with long-term security challenges can glean some helpful information based off RSA tips presented at this year's conference.
securityintelligence.webp 2017-02-17 12:30:40 2017 HIMSS Conference and Exhibition: IBM MaaS360 (lien direct) IBM will demonstrate how MaaS360 can help health care IT professionals manage the mobile devices on their networks at this year's HIMSS Conference.
securityintelligence.webp 2017-02-16 14:10:39 The Coming Revolution of Voice Control With Artificial Intelligence (lien direct) New capabilities such as artificial intelligence and voice control make it easier to interact with our devices, but they also introduce security concerns.
securityintelligence.webp 2017-02-16 13:00:41 It\'s Time for Users to Pony Up and Quit Reusing Passwords (lien direct) By reusing passwords across multiple services, users make it easier for cybercriminals to breach all their accounts, not to mention company databases.
securityintelligence.webp 2017-02-16 12:05:37 CSOs Who Understand the User Experience Deliver Better Security (lien direct) A smooth user experience leads to more secure systems and databases. CSOs should consult users directly to resolve issues related to the data they access. Guideline
securityintelligence.webp 2017-02-15 18:00:43 The Full Shamoon: How the Devastating Malware Was Inserted Into Networks (lien direct) X-Force IRIS researchers found that the Shamoon malware operators relied on weaponized documents that leveraged PowerShell to infiltrate targeted networks.
securityintelligence.webp 2017-02-15 13:10:38 Before, During and After: Dealing With Attacks and Applying Effective Incident Management (lien direct) A planned, communicated, rehearsed and organizationally tailored incident management program is central to an effective security strategy.
securityintelligence.webp 2017-02-15 12:05:36 Time to Stop Shaming Phishing Victims (lien direct) It is counterproductive to shame phishing victims because it discourages end users from alerting IT professionals of suspicious emails or activity.
securityintelligence.webp 2017-02-14 13:30:39 For the Love of SIEM (lien direct) Not feeling the love from your SIEM solution? Integrate it with existing tools to best fit the unique needs and goals of your business.
securityintelligence.webp 2017-02-14 12:35:36 Learn to Love Online Dating Security (lien direct) IT leaders must educate employees about online dating security to minimize the risks associated with the use of these services in the workplace. Guideline
securityintelligence.webp 2017-02-14 11:30:39 Indian Banking Customers, Beware! Hackers Have an Eye on Your Money (lien direct) The Indian government implemented new policies and guidance in response to several high-profile attacks against the Indian banking sector in the past year.
securityintelligence.webp 2017-02-13 10:05:37 Bringing the Power of Watson and Cognitive Computing to the Security Operations Center (lien direct) The power of Watson and cognitive computing enables security operations center specialists to defend their environments against threats with confidence.
securityintelligence.webp 2017-02-13 10:00:45 IBM QRadar Advisor with Watson: Revolutionizing the Way Security Analysts Work (lien direct) IBM Security developed QRadar Advisor to help IT analysts address gaps in speed, accuracy and intelligence and respond to incidents more confidently
securityintelligence.webp 2017-02-13 10:00:41 It\'s Time to Go Beyond Next-Generation Endpoint Security (lien direct) To protect the most vulnerable gateways into their networks, IT leaders must go beyond next-generation endpoint security with IBM BigFix Detect. Guideline
securityintelligence.webp 2017-02-10 14:00:55 The Red Portal: IBM X-Force Red\'s Collaborative Client Experience (lien direct) IBM X-Force Red launched The Red Portal, which provides security professionals and clients with an end-to-end view of security testing programs.
securityintelligence.webp 2017-02-10 13:00:39 Overcoming the Security Side-Eye: Making Collaborative Threat Intelligence Work (lien direct) To effectively share threat intelligence, security professionals must develop processes, resources and trust relationships with other industry players.
securityintelligence.webp 2017-02-10 11:30:39 The Future of Cybersecurity (lien direct) Emerging technologies such as big data analytics, cognitive computing and the Internet of Things (IoT) are shaping the future of cybersecurity.
securityintelligence.webp 2017-02-09 14:05:35 SAP HANA Security Evolution, From SPS08 to Now (lien direct) The SAP HANA security evolution started in 2011, peaked in 2014 and continues to deliver critical enhancements to provide analysts with greater visibility.
securityintelligence.webp 2017-02-09 13:10:38 An Education Initiative in Cognitive Application: How I Embarked on Designing a Master\'s Course for GSU (lien direct) An education in cognitive application should demonstrate the power of Watson and show students what it takes to become a security analyst.
securityintelligence.webp 2017-02-09 12:40:36 Did Your Developer Leave a Website Backdoor? (lien direct) A Dutch developer stole e-commerce customers' login credentials using a website backdoor and admin access that former employers had neglected to revoke.
Last update at: 2024-07-16 11:08:47
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter