What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2016-05-12 11:35:52 Is Imperfect Data Security Getting You Down? (lien direct) Here's what businesses really need to get a handle on data protection so imperfect data security doesn't get them down — or get them into trouble.
securityintelligence.webp 2016-05-11 10:40:54 A Simpler, More Dynamic Way to Manage Endpoints (lien direct) IT departments must manage endpoints even as workplaces grow larger, networks get more complex and the workforce becomes more mobile.
securityintelligence.webp 2016-05-10 10:00:54 Cognitive Security Helps Beat the Bad Guys at Unprecedented Scale and Speed (lien direct) IBM is introducing a cloud-based version of its cognitive security analytics solution that uses core Watson technology trained in the language of security.
securityintelligence.webp 2016-05-09 12:55:51 Insider Attacks May Be Closer Than They Appear (lien direct) Security policies and employee education are just two of the many ways that organizations can mitigate the threat of insider attacks.
securityintelligence.webp 2016-05-09 10:40:51 Saying Yes to No(SQL) Databases: Next-Generation Applications Can Be Secure (lien direct) NoSQL databases today come with rudimentary security installed, but with some extra foresight, you can completely up the ante to secure all applications.
securityintelligence.webp 2016-05-08 11:50:53 The InfoSecond, Week of May 9, 2016 (lien direct) The top story in this week's InfoSecond is the massive global email hack in which 272 million user names and passwords were stolen and then traded online.
securityintelligence.webp 2016-05-06 11:45:50 Does Mom Know Best About Internet Security? (lien direct) What does mom know about security? Probably more than we'd like to admit. Here are some of mom's favorite life lessons, security-style.
securityintelligence.webp 2016-05-06 09:40:50 The Evolution of Voice Authentication as a Security Method (lien direct) Voice authentication has the potential to alter the security industry, but the access method comes with some drawbacks that should be considered.
securityintelligence.webp 2016-05-05 11:35:50 Why I Quit Marketing IT Security Products (and Came Back Again) (lien direct) CASB has been around for a few years and presents a great opportunity for sellers to improve marketing IT security products and solutions.
securityintelligence.webp 2016-05-04 13:35:51 How to Make the Most of Your Pen Test (lien direct) A pen test can be tremendously valuable for your team and organization, but you have to know how to glean the key lessons from the experience.
securityintelligence.webp 2016-05-04 11:05:50 Six Reasons Use Cases Are Crucial for Building SIEM and Security Operations Capabilities (lien direct) Use cases can help your security information and event management (SIEM) and security operations teams improve their deployments and efficiency.
securityintelligence.webp 2016-05-03 18:55:50 Bank Teller or Robber? Analytics, Predictive Insight and Agility Can Stop Data Breaches Before They Begin (lien direct) Are insiders leading to data breaches within your organization? The right security tools and analytics can help you find out — and prevent these incidents. Guideline
securityintelligence.webp 2016-05-03 18:45:51 Cloud Risks Pose the Latest Security Education Challenge (lien direct) Employees must be educated to avoid cloud risks and ensure this new era of cloud technology is a secure one for their organizations.
securityintelligence.webp 2016-05-02 13:50:50 Lessons Learned From the Panama Papers: 10 Convenient Ways to Improve Your Security Protection (lien direct) The Panama Papers have shed a light on the risks involved with corporate data protection and underscored the importance of effective security measures.
securityintelligence.webp 2016-05-02 10:50:49 Why Do Incidents Become Breaches? (lien direct) Organizations can prevent damaging data breaches by identifying assets, monitoring those assets and implementing a tested incident response plan.
securityintelligence.webp 2016-05-01 13:45:49 The InfoSecond, Week of May 2: JIGSAW Ransomware, GozNym Malware and More! (lien direct) This week's InfoSecond takes a scary turn, with stories about the JIGSAW ransomware and the GozNym banking Trojan's rapid spread to Europe.
securityintelligence.webp 2016-04-29 14:00:52 It\'s Time to Let Go of QuickTime for Windows (lien direct) IBM BigFix has a fixlet available for corporate users looking to uninstall QuickTime for Windows, which was found to have serious vulnerabilities.
securityintelligence.webp 2016-04-29 11:40:48 A Future Full of Drones — and the Advanced Threats They Present (lien direct) Drones may be a relatively new technology, but there are a number of established risks and threats that need to be addressed by all organizations.
securityintelligence.webp 2016-04-28 14:00:54 Mobile Malware Competition Rises in Underground Markets (lien direct) The mobile malware market is growing at an impressive rate, giving cybercriminals more options when it comes to infiltrating devices.
securityintelligence.webp 2016-04-28 10:30:52 Understanding EdgeHTML\'s Attack Surface and Exploit Mitigations (lien direct) EdgeHTML's large attack surface can be daunting for users. Learn more about possible attacks as well as exploit mitigations that enhance security.
securityintelligence.webp 2016-04-27 12:31:05 IBM MaaS360 Massively Reimagines Enterprise Mobility Management (lien direct) IBM has announced a number of updates and enhancements to its MaaS360 enterprise mobility management offering aimed at increasing mobile productivity.
securityintelligence.webp 2016-04-27 10:05:49 Engaging Conversations Key to Improving Cyber Risk Decisions (lien direct) C-level executives, boards of directors and security leadership need to have engaging conversations to make better cyber risk decisions for the business. Guideline
securityintelligence.webp 2016-04-26 13:45:53 What\'s the Big Deal With the IBM BigFix Culture? (lien direct) What makes the culture at IBM BigFix so unique? Three employees give their opinions on working in the BigFix office and creating a great product.
securityintelligence.webp 2016-04-26 10:50:48 SS7 Vulnerability Isn\'t a Flaw — It Was Designed That Way (lien direct) The SS7 vulnerability may have recently made headlines, but the flaw itself has actually been around for decades and is integral to the user experience.
securityintelligence.webp 2016-04-25 10:00:49 Time Is Money: GozNym Launches Redirection Attacks in Poland (lien direct) The GozNym banking Trojan has pivoted its focus from targeting North American institutions to launching redirection attacks in Europe.
securityintelligence.webp 2016-04-24 13:05:47 The InfoSecond, Week of April 25, 2016 (lien direct) Winter has come - and now it's gone, as Springtime has finally begun to arrive across the land. While you wait for this new season of 'Game of Thrones'...
securityintelligence.webp 2016-04-22 14:00:48 The Price of Privacy: How Much Is Your Personal Data Worth to You? (lien direct) Consumers are looking forward to smart homes and connected devices, but what will the cost be to keep the personal data collected safe?
securityintelligence.webp 2016-04-22 11:45:47 Information Security Across Industries: What\'s Hot? (lien direct) There are hot information security topics that are taking hold throughout various industries, and it's important to have a grasp on these concepts.
securityintelligence.webp 2016-04-21 11:00:47 Four Simple Ways to Make Your Use of Cloud Applications 100 Times More Secure (lien direct) The widespread use of cloud applications can be beneficial for organizations, but it also opens them up to sophisticated cyberattacks.
securityintelligence.webp 2016-04-20 13:15:50 IoT Security and the Automotive Industry: Highway Heaven or Driver Hell? (lien direct) It's clear from both IoT advocates and skeptics alike that security is the key to the continued technological maturity of the automotive industry.
securityintelligence.webp 2016-04-20 09:45:48 Reviewing the Threat Landscape with IBM X-Force: Serious Data Breaches, Major Attacks and New Vulnerabilities (lien direct) The "IBM 2016 Cyber Security Intelligence Index" reveals IBM X-Force's collected data on the threat landscape and attack types affecting all industries.
securityintelligence.webp 2016-04-19 11:15:46 Three Steps to Stop a Threat Before It Becomes an Incident (lien direct) Threats today use devices and servers to gain access to data and the corporate environment. That's why organizations need an incident response strategy.
securityintelligence.webp 2016-04-18 13:15:53 Mobile Security: Hear That Train a Comin\' and Don\'t Let Mobile Fraud Hit You! (lien direct) Mobile fraud is coming to the enterprise, but luckily, there is time to get a comprehensive mobile security strategy launched for better protection.
securityintelligence.webp 2016-04-15 19:38:55 What to Look for When It Comes to Identity and Access Governance (lien direct) What does it really take to have a successful identity and access governance program to centralize and govern your identity management?
securityintelligence.webp 2016-04-15 19:38:12 E.ON Streamlines IT Audits: Identity Governance in Action (lien direct) Large organizations can solve problems related to identity governance and security compliance with the help of the right solutions.
securityintelligence.webp 2016-04-15 12:21:33 How to Balance Low Investment Cost and High Risk Reduction in a Security Initiative (lien direct) Balancing risk reduction and costly security investments can be tricky, but one effective way to do it is by emphasizing user awareness training.
securityintelligence.webp 2016-04-15 11:30:44 Why Do Companies Need an Enterprise Mobile Strategy? (lien direct) It is essential for enterprises to implement a holistic mobile security strategy that protects devices, manages access, enables collaboration and more.
securityintelligence.webp 2016-04-14 13:35:45 Got WordPress? PHP C99 Webshell Attacks Increasing (lien direct) IBM MSS X-Force researchers found that C99 webshell attacks are increasing, particularly against content management systems such as WordPress.
securityintelligence.webp 2016-04-14 11:55:42 Do You Know Where Your Data Goes When You Can\'t See It? (lien direct) As your cloud data traverses the world, it would be nice to know where it went. Organizations need cloud security governance processes for this reason.
securityintelligence.webp 2016-04-14 10:00:47 Meet GozNym: The Banking Malware Offspring of Gozi ISFB and Nymaim (lien direct) The new GozNym hybrid takes the best of both the Nymaim and Gozi ISFB malware to create a powerful Trojan targeting banks in the U.S. and Canada.
securityintelligence.webp 2016-04-13 12:00:44 Ransomware Attacks Will Not Stop Anytime Soon (lien direct) Ransomware attacks show no signs of slowing down, and the security solutions most organizations use are not enough to defend against this threat.
securityintelligence.webp 2016-04-13 11:20:43 The Three Little Pigs on Hybrid Cloud Security: New Research on the Straw, Sticks and Bricks (lien direct) New research on hybrid cloud security identified the platform built with the strongest bricks will be ready to withstand any attack from big, bad wolves.
securityintelligence.webp 2016-04-12 12:55:43 Securing the C-Suite, Part 2: The Role of CFOs, CMOs and CHROs (lien direct) The new 2016 "Securing the C-Suite" report from IBM revealed some insights and recommendations on the role of CFOs, CMOs and CHROs in cybersecurity.
securityintelligence.webp 2016-04-12 12:00:44 Enhancing Incident Response: The Role of Strategic Partners in Your Security Posture (lien direct) Strategic relationships may be an organization's principal source for obtaining essential artifacts in incident response investigations.
securityintelligence.webp 2016-04-12 11:05:43 When Operations Managers Speak Security Awareness, Do Employees Really Understand? (lien direct) Operations managers must have the education, resources and control needed to make smart business and security decisions for their local departments.
securityintelligence.webp 2016-04-11 13:20:42 Be Preemptive and Be Prepared: How to Address Mobile Application Security Threats in Your Organization (lien direct) Achieving safe and effective mobile application security isn't impossible, but it does require a lot of time and effort from internal parties.
securityintelligence.webp 2016-04-11 12:05:42 Why IT and Security Staff Need the Time and Budget to Go to Security Conferences (lien direct) Attending security conferences gives employees experience and connections that can help both themselves and their employers succeed.
securityintelligence.webp 2016-04-11 10:50:43 Your Data on a Date: Data Security for Every Occasion (lien direct) Comprehensive data security is a lot like watching your daughter head out on a first date. Here's what you need to know before saying goodbye.
Last update at: 2024-07-16 13:08:34
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter