What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2016-09-05 14:50:31 Take Advantage of Security Cheat Codes With Behavioral Intelligence (lien direct) Behavioral intelligence helps analysts understand behavior patterns to sniff out insider threats before they occur - a kind of cheat code for IT security.
securityintelligence.webp 2016-09-05 13:25:28 Why Should Women in Security Shoot for the Stars? (lien direct) In response to the dearth of women in security, IBM is leading an industrywide push to encourage and enable women to pursue cybersecurity careers. Guideline
securityintelligence.webp 2016-09-04 14:25:26 Cybercrime-as-a-Service Poses a Growing Challenge (lien direct) Cybercrime-as-a-service poses a new security challenge because it allows malicious actors to leverage other cybercriminals' resources to conduct attacks.
securityintelligence.webp 2016-09-02 12:30:40 Fighting Fire With WinDBG: Breaking URLZone\'s Anti-VM Armor (lien direct) URLZone, a sophisticated banking Trojan that first emerged in 2009, keeps its inner workings under wraps with extensive anti-research features.
securityintelligence.webp 2016-09-02 11:40:29 Podcast: Today\'s Fraud Trends, From the Dark Web to Pokemon Go (lien direct) In this short podcast, IBM Executive Security Advisor Etay Maor shares his thoughts on the current state of cyber fraud and the latest fraud trends.
securityintelligence.webp 2016-09-02 11:10:26 Data Sabotage: The Serious Security Risk of Smart Cities (lien direct) Smart city technology is on the rise, bringing more efficient ways to administer city services. But the new threat of data sabotage also looms.
securityintelligence.webp 2016-09-01 13:00:48 Undocumented Patched Vulnerability in Nexus 5X Allowed for Memory Dumping via USB (lien direct) The IBM X-Force Application Security Research Team discovered a previously undocumented vulnerability in older versions of Nexus 5X's Android images.
securityintelligence.webp 2016-09-01 11:50:25 Is IoT Security a Ticking Time Bomb? (lien direct) The IoT will continue to grow and evolve at a rapid pace, but many devices, apps and infrastructure are developed with IoT security as an afterthought.
securityintelligence.webp 2016-09-01 10:45:28 Anti-ROP: A Moving Target Defense (lien direct) IBM Research - Haifa recently developed a solution that acts like a moving target, randomizing files to safeguard against ROP attacks.
securityintelligence.webp 2016-08-31 12:35:25 Want Fries With Your EXTRABACON or EPICBANANA? Cisco Addresses Two New Vulnerabilities (lien direct) Cisco recently addressed two exploits that sound more like delicious drive-thru menu items than dangerous security risks: EXTRABACON and EPICBANANA.
securityintelligence.webp 2016-08-31 11:15:25 Out With the Old, in With the New: Are You Ready to Move to IDaaS? (lien direct) A move to IDaaS requires skill, knowledge and a small leap of faith, but the increased control over the cloud environment is well worth the elbow grease.
securityintelligence.webp 2016-08-31 09:35:25 How Small and Midsize Businesses Can Stop Cyberattacks (lien direct) In addition to the financial repercussions that result from cyberattacks, small and midsize businesses stand to lose the trust of their customers.
securityintelligence.webp 2016-08-30 12:25:24 Sabotage: The Latest Threat to the Financial/Banking Industry (lien direct) Data sabotage has become a top security concern impacting the financial/banking industry as cybercriminals find ways to profit by altering financial data.
securityintelligence.webp 2016-08-30 11:35:25 Dealing With Third-Party Vendor Connections in Your Network (lien direct) While most third-party vendor connections are harmless and well-intentioned, they can act as footholds for attackers to gain access to your network.
securityintelligence.webp 2016-08-30 08:15:26 Identify Vulnerabilities in Your IT Infrastructure, Policies and Procedures Before the Bad Guys Do (lien direct) Penetration testing is one of the most effective ways to monitor the security of your IT environment and identify vulnerabilities.
securityintelligence.webp 2016-08-29 12:45:27 The Increasing Dangers of Code Hooking (lien direct) Cybercriminals use code hooking to intercept OS function calls to alter or augment their behavior. The technique is becoming more popular and dangerous.
securityintelligence.webp 2016-08-29 11:00:25 Five Signs of Identity Governance Trouble (lien direct) Security leaders can manage their organization's risk by identifying and remediating identity governance trouble before it leads to a damaging data breach. Guideline
securityintelligence.webp 2016-08-29 08:05:24 Banking From Brexit to Blockchain: Enabling Commerce by Expanding the International Privacy Shield (lien direct) Blockchain provides a secure, transparent ledger that serves as an efficient banking solution for companies lacking full access to banking infrastructure.
securityintelligence.webp 2016-08-28 14:35:24 Raising the Profile of Women in Security (lien direct) Despite the shortage of women in security, the barriers to achieving gender equality are coming down as women gain more influence in the industry.
securityintelligence.webp 2016-08-26 11:35:23 Security Conferences Abound: Which Should You Attend? (lien direct) Security leaders, professionals and operational business leaders all stand to benefit from the myriad security conferences being held in 2017. Guideline
securityintelligence.webp 2016-08-26 05:00:25 Ramnit Rears Its Ugly Head Again, Targets Major UK Banks (lien direct) After an eight-month period of dormancy, the Ramnit Trojan has resurfaced to attack the customers of six major banks in the U.K.
securityintelligence.webp 2016-08-25 13:00:24 Do Faster Payments Mean Faster Fraud? (lien direct) A system of faster clearing times could help businesses and hardworking families, but the shift could open a window for cybercriminals to commit fraud.
securityintelligence.webp 2016-08-25 11:50:23 Using Blockchain to Address Drone Cybersecurity (lien direct) The vast availability of drones raises many concerns about drone cybersecurity. However, blockchain technology may be able to help.
securityintelligence.webp 2016-08-25 09:50:24 Three Overlooked Benefits of a CASB (lien direct) A CASB is helpful for harnessing shadow IT cloud applications, but it can also offer three additional benefits that companies often overlook.
securityintelligence.webp 2016-08-24 12:55:23 Get the Security Budget You Need and Spend It Wisely (lien direct) Many CISOs find it challenging to convince their boards of directors to increase their security budget to mitigate the cost of a potential data breach.
securityintelligence.webp 2016-08-24 11:45:23 Chip-and-PIN Fraud: The New Face of Credit Crime? (lien direct) As companies increasingly adopt EMV technology for point-of-sale terminals, attackers are finding new ways to commit chip-and-PIN fraud.
securityintelligence.webp 2016-08-24 10:00:25 Understanding the SPF and DKIM Spam Filtering Mechanisms (lien direct) Sender Policy Framework and DomainKeys Identified Mail are two techniques that can be used to limit the amount of spam in inboxes.
securityintelligence.webp 2016-08-23 12:50:24 Dangle Carrots in Front of Users to Correct Their Terrible Password Hygiene (lien direct) Rewarding users for strong password selection can be a good way to eliminate terrible password hygiene throughout an organization.
securityintelligence.webp 2016-08-23 11:00:26 GozNym\'s Euro Trip: Launching Redirection Attacks in Germany (lien direct) GozNym continued its trip around Europe by launching redirection attacks against 13 German banks. The volume of these attacks has spiked in recent months.
securityintelligence.webp 2016-08-22 15:00:25 Innovation Fuels IBM QRadar Leadership (Again) in Gartner\'s 2016 Magic Quadrant for SIEM (lien direct) IBM QRadar is a leader again in the 2016 Gartner Magic Quadrant for SIEM, further cementing its reputation as a top security solution. Guideline
securityintelligence.webp 2016-08-22 10:30:24 Is Watson Like a Firefly? (lien direct) You've heard the buzz words "Watson" and "cognitive" floating like fireflies on a summer night. Watson is changing the future, one small step at a time.
securityintelligence.webp 2016-08-19 12:00:24 Get the Identity Governance Scoop: Interview With an Expert (lien direct) To learn more about identity governance and intelligence, we interviewed Andy Taylor, one of IBM's identity and access management specialists.
securityintelligence.webp 2016-08-19 11:45:22 Planning Your Response: Top Three Reasons to Integrate Your SIEM With an Incident Response Platform (lien direct) An incident response platform facilitates communication across an organization and generates insight on how to contain and resolve security incidents.
securityintelligence.webp 2016-08-18 10:05:22 The Top Four Reasons CISOs Are Adopting Cloud-Based Solutions for Identity and Access Management (lien direct) As business moves to the cloud, it makes sense for CISOs to manage identity and access management functions with cloud-based solutions.
securityintelligence.webp 2016-08-17 11:40:22 New FFIEC Mobile Financial Services Guidelines Services Put a Stake in the Ground (lien direct) The Federal Financial Institutions Examination Council put a stake in the ground with recent guidance on risks associated with mobile financial services.
securityintelligence.webp 2016-08-16 14:00:23 Brazil Can\'t Catch a Break: After Panda Comes the Sphinx (lien direct) IBM X-Force researchers uncovered the first Zeus Sphinx attacks in Brazil, which target online banking and payment services in Brazil's top banks.
securityintelligence.webp 2016-08-16 07:40:21 As India Gears Up for Cybersecurity Challenges, Threats Are Multiplying (lien direct) India has launched a series of initiatives aimed at overcoming cybersecurity challenges, decreasing costs and battling modern threats.
securityintelligence.webp 2016-08-15 08:40:22 Getting Ready for the European Union\'s General Data Protection Regulation? Learn, Think and Prepare (lien direct) The European Union's General Data Protection Regulation goes into effect on May 25, 2018, and subjects noncomplying organizations to steep fines.
securityintelligence.webp 2016-08-12 10:30:32 A Risk-Driven Approach to Security, From Check Boxes to Risk Management Frameworks (lien direct) Department heads have to start thinking about risk management in terms of acceptable risk levels, not compliance requirements to mark off a checklist.
securityintelligence.webp 2016-08-11 13:10:21 Cloud IAM Scenarios in Retail, Academia and Finance: Three Tips From an IDaaS Expert (lien direct) The demand for IDaaS is expanding into every industry. Retailers, universities and financial institutions can benefit from adopting cloud IAM solutions.
securityintelligence.webp 2016-08-11 10:30:21 Go for Gold by Transforming Compliance Into Data Security (lien direct) Organizations should go for gold when it comes to data security rather than simply doing enough to satisfy compliance requirements.
securityintelligence.webp 2016-08-10 12:10:26 Government Data Woes: 2016 Compromised Records Surpass Total for Last Three Years Combined (lien direct) Government entities in the U.S. and abroad have been targeted by malware infections, phishing schemes, SQL injection attacks and more.
securityintelligence.webp 2016-08-10 09:40:19 Millennials Are Not Burdens but Vital in the Security Workforce (lien direct) Millennials are not the problem; they're the future. The ability to attract and retain millennial talent is a vital to long-term success in security.
securityintelligence.webp 2016-08-09 12:35:19 Using Feedback Loops to Enhance End User Security (lien direct) Security teams can use a feedback loop to measure end user security, educate users, illustrate consequences and measure end user behavior.
securityintelligence.webp 2016-08-09 08:25:18 Insider Threats in India: Is It Time to Focus on Privileged Users? (lien direct) Insider threats can be even more devastating to an Indian organization than distributed denial-of-service (DDoS) or malware attacks.
securityintelligence.webp 2016-08-08 10:20:19 Ransomware and Health Care: There\'s More at Risk Than Just Money (lien direct) Many cybercriminals have turned to ransomware as a cheaper, simpler alternative to traditional methods of stealing medical records.
securityintelligence.webp 2016-08-05 14:10:19 Protecting Your Network Through Understanding DNS Requests (lien direct) Sometimes it just takes a little common sense and knowledge of your system log files and the DNS requests contained therein to detect a data breach.
securityintelligence.webp 2016-08-05 11:05:19 Identity Theft and Social Media: How Are They Related? (lien direct) Social media has created many new ways for people to interact. While this can be viewed as exciting, it also leaves users vulnerable to identity theft.
securityintelligence.webp 2016-08-04 16:00:20 Panda Is One Hungry Bear! A Heavyweight Banking Trojan Rolls Into Brazil (lien direct) A new Zeus Trojan variant called Panda Banker that started targeting banks in Europe and North America early this year has spread to Brazil.
securityintelligence.webp 2016-08-04 11:35:35 The True Cost of Cybercrime in Brazil (lien direct) Cybercrime in Brazil continues to rise. In fact, the average cost of a data breach increased significantly in 2016.
Last update at: 2024-07-16 13:08:34
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter