What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2018-02-23 12:35:04 No More Jumping Through Hoops: Consolidating Access Requests in One Platform With Identity Governance and Intelligence (lien direct) With ServiceNow and IBM Identity Governance and Intelligence, users no longer have to jump through hoops to submit requests for access to enterprise applications and physical assets.
securityintelligence.webp 2018-02-23 12:25:04 Simplicity Is the Key to Progress in Endpoint Security (lien direct) To remain secure amid the growing cybersecurity skills gap, it's critical for organizations to reduce the complexity of endpoint security processes wherever possible.
securityintelligence.webp 2018-02-22 12:55:04 Discover Silent Identity and Access Management (lien direct) Silent identity and access management (IAM) solutions are designed to work seamlessly in the background so that users don't even know it's there, intervening only when problems arise. ★★
securityintelligence.webp 2018-02-22 12:30:04 Unified Endpoint Management: Why a UEM Solution Is a Compulsory Choice for a Modern Organization (lien direct) Modern organizations need a UEM solution that harnesses the power of cognitive technology to deliver enhanced data security, maximize user productivity and increase operational efficiency.
securityintelligence.webp 2018-02-21 13:11:00 Why Data Security Should Be at the Top of Every Retailer\'s Shopping List (lien direct) Thanks largely to recent news headlines, consumers are becoming more aware of security concerns, meaning that retailers must improve their data security practices to earn customer trust.
securityintelligence.webp 2018-02-21 11:00:05 IBM X Force IRIS Uncovers Active Business Email Compromise Campaign Targeting Fortune 500 Companies (lien direct) IBM X-Force IRIS observed a widespread business email compromise (BEC) campaign targeting many Fortune 500 companies that exploits flaws in common accounts payable processes. ★★★★★
securityintelligence.webp 2018-02-20 13:15:04 The Journey to Security and Cyber Resiliency (lien direct) At Think 2018, attendees will learn how an integrated approach to security and resiliency can help them prevent cyberattacks and effectively respond to the ones that slip through their defenses.
securityintelligence.webp 2018-02-20 12:45:04 The Art of Disclosing Your Incident Response Strategy to the Public (lien direct) As data breaches gain public attention, vulnerability disclosure becomes an increasingly crucial part of the incident response process.
securityintelligence.webp 2018-02-19 13:25:04 You Don\'t Have to Sacrifice Security for Convenience to Establish Digital Trust (lien direct) In an age of limited physical interaction, organizations need a way to establish digital trust without compromising the user experience.
securityintelligence.webp 2018-02-19 12:30:05 IBM Identity Study Shows Security May Be Financial Services Firms\' Best Defense Against Disruption (lien direct) According to the "IBM Future of Identity Study," consumers are beginning to prioritize security over convenience, making trust a crucial competitive advantage for financial institutions.
securityintelligence.webp 2018-02-16 12:45:04 Where Is Your Sensitive Information and Where Is It Going? (lien direct) To protect sensitive information, security professionals must know exactly where this data resides, who is accessing it, when it is being accessed and whether this activity violates policy.
securityintelligence.webp 2018-02-16 12:30:03 The Inconvenient Reality of Law Firm Security Challenges (lien direct) Organizations that take an IT-centric approach to law firm security risk exposing sensitive data to malicious actors and damaging client trust.
securityintelligence.webp 2018-02-15 13:55:04 Data Risk Management, Part 3: Assessing Risk Levels of Structured Versus Unstructured Data (lien direct) To protect their crown jewels from data thieves, organizations must determine the difference in risk levels between structured and unstructured data and prioritize accordingly.
securityintelligence.webp 2018-02-15 12:05:00 TrickBot\'s Cryptocurrency Hunger: Tricking the Bitcoin Out of Wallets (lien direct) TrickBot is getting in on the cryptocurrency gold rush, expanding its operations to target digital wallets and exchanges using serverside injections and other malicious tactics.
securityintelligence.webp 2018-02-14 13:36:00 How Cybercriminals Use Money Mule Accounts to Profit From Online Fraud (lien direct) As cybercriminal tactics evolve, banks must employ fraud detection solutions that leverage artificial intelligence to evaluate new registrations for signs of money mule activity.
securityintelligence.webp 2018-02-14 13:21:00 What Do You Get for Waking Up in Vegas at Think 2018? Application Security Testing Knowledge! (lien direct) At Think 2018, attendees will have an opportunity to glean knowledge about application security testing from some of the foremost experts in the field. ★★★★★
securityintelligence.webp 2018-02-13 12:30:03 Establishing Trust With Identity Governance Intelligence (lien direct) An identity governance solution that presents advanced analytics in plain business language is the key to establishing trust between IT and security teams and line-of-business managers.
securityintelligence.webp 2018-02-12 12:45:03 Using Data Protection Guidelines to Balance Security and Compliance in 2018 (lien direct) When organizations follow frameworks such as Gartner's Data-Centric Audit and Protection (DCAP) guidelines, security and compliance can coexist and even complement one another.
securityintelligence.webp 2018-02-09 12:30:30 How to Improve Cyber Literacy Within Your Organization (lien direct) The quest to promote cyber literacy is as old as the internet itself, but the increasing connectedness of the technology landscape is making it more important than ever.
securityintelligence.webp 2018-02-09 11:05:29 Read My Lips: Researchers Find Ways to Fool Speech Recognition Systems (lien direct) Researchers have devised ways to manipulate speech recognition systems to carry out hidden commands, suggesting that cybercriminals will soon develop similar ways to exploit this technology. ★★★
securityintelligence.webp 2018-02-08 13:11:04 Why Device ID May Not Be Enough to Stop Fraud (lien direct) To defeat increasingly sophisticated fraudsters, security teams should pair their fraud detection tools with a device ID spoofing mechanism that automatically adapts to new threats.
securityintelligence.webp 2018-02-08 12:00:34 In 2018, Security-as-a-Service Is Where It\'s At (lien direct) Security leaders are increasingly turning to security-as-a-service (SECaaS) to keep up with rapidly evolving threats and address the growing skills shortage. Guideline
securityintelligence.webp 2018-02-07 13:09:37 Three Characteristics of a Successful Agile Security and Risk Management Implementation (lien direct) To keep up with increasingly sophisticated threat actors, many of whom have begun using AI in their attacks, organizations must fully embrace Agile security and risk management strategies.
securityintelligence.webp 2018-02-07 12:45:26 Architecting Segmentation Defense in the Cloud (lien direct) Architecting segmentation defense in the cloud can be time-consuming, but it can offer tremendous security benefits at little to no additional cost.
securityintelligence.webp 2018-02-06 13:30:40 Minimizing the Encryption Blast Radius (lien direct) The only way to reduce the encryption blast radius is to keep moving forward and embrace the advancements the technology has undergone over the years.
securityintelligence.webp 2018-02-06 12:10:34 The Expanding Role of the CISO: Seven Attributes of a Successful Security Leader (lien direct) The role of the security leader is expanding, and CISOs must posses strong communication skills, extensive technical knowledge, analytical minds and the respect of their peers to be successful. Guideline
securityintelligence.webp 2018-02-06 11:50:28 January\'s Top Cybersecurity News Stories: Jackpotting, Cryptocurrency Mining and Other Emerging Trends (lien direct) The start of February is a great time for organizations and individuals to sweep away the confetti and dig into the most significant cybersecurity news stories from the past month.
securityintelligence.webp 2018-02-05 13:30:00 Using Machine Learning to Make Faster, Smarter Decisions About Insider Threats (lien direct) Security professionals need a comprehensive way to analyze user behavior, automatically respond to reports of suspicious activity and manage user access accordingly to thwart insider threats.
securityintelligence.webp 2018-02-05 12:50:35 What Can We Learn From the World Economic Forum\'s Cyber Resilience Playbook (lien direct) The WEF's "Cyber Resilience: Playbook for Public-Private Collaboration" aims to help governments align security policies with key values and promote collaboration both within and across borders.
securityintelligence.webp 2018-02-05 09:00:19 What You Should Know Before You Put Your GDPR Program in Motion (lien direct) Organizations should take these steps to put their GDPR readiness plans in motion and make the transition as smooth as possible once the regulation takes effect in May.
securityintelligence.webp 2018-02-02 13:00:26 Android Device Management: Sweet Features, No Toothache (lien direct) Android device management doesn't need to be difficult, as long as security leaders consider the privacy needs of the organization, IT department and user population before rolling out a UEM solution. Guideline
securityintelligence.webp 2018-02-02 12:50:23 Securing User Identities With Blockchain Technology (lien direct) The security world is searching for a replacement for passwords. Passwords are becoming irrelevant because they can be discovered and broken as computers gain processing power. In addition, stolen user identities are increasingly cheap and easy to come by. Any solution will require a shift in how personal information is managed and stored - and […]
securityintelligence.webp 2018-02-02 12:45:02 Cloud Security Is a Moving Target (lien direct) There are many misconceptions about cloud security, but one thing is for certain: Cybercriminals will always target high-value data wherever it resides.
securityintelligence.webp 2018-02-01 17:13:58 Why Endpoint Management Is Critical to Security Strategy (lien direct) Endpoint management is typically the responsibility of the IT operations or infrastructure teams, not the security team. So why should security care about endpoint hygiene? Pervasive Endpoint Vulnerabilities Attacks come from all directions, and many of them originate on endpoints. In fact, according to IDC, 70 percent of successful breaches begin at the endpoint. As […]
securityintelligence.webp 2018-02-01 12:10:58 10 Steps to Evaluate Cloud Service Providers for FedRAMP Compliance (lien direct) Companies that wish to do business with federal government agencies in the cloud must complete these 10 steps to achieve FedRAMP compliance.
securityintelligence.webp 2018-01-31 13:15:45 In 2018, Data Security Is No Longer an Underdog (lien direct) Once the underdog of the enterprise security world, data security is finally gaining momentum as a driver of revenue.
securityintelligence.webp 2018-01-31 13:05:46 Open Banking and PSD2: Disruption or Confusion? (lien direct) If you’re not yet familiar with the concept of open banking, you’re not alone. U.K. consumer advice firm Which? reported that 92 percent of the public is unaware of the initiative, which officially launched on Jan. 13, 2018, to promote the use of application programming interfaces (APIs) to enable developers to build applications to augment […]
securityintelligence.webp 2018-01-31 13:00:50 Who Needs a College Degree? Filling the Skills Gap With Qualified New Collar Professionals (lien direct) A college degree was once thought to guarantee a successful career. For some professions, structured coursework and vetted certification is the only way to ensure that a student was prepared to take on a challenging job. Other industries, however, don’t necessarily equate the lack of a college education to a lack of qualification. These roles […]
securityintelligence.webp 2018-01-30 13:30:51 No Rest for the Weary: Applying Security Lessons From 2017 in the New Year (lien direct) How can it be that we are already through January and moving into February of the new year? I don’t know about you, but I still have a long list of resolutions to accomplish and I need to focus on what I can realistically get done in 2018. This makes me think about how everyone […]
securityintelligence.webp 2018-01-30 13:30:40 2018 Financial Malware Trends and Predictions: Organized Cybercrime Continues to Rise (lien direct) As we enter 2018, the financial cybercrime landscape is evolving. IBM X-Force research has been tracking cybercrime activity around the world, and in a new report, examined the cybercrime shifts of 2017 and what financial institutions can expect to see in 2018. Last year saw the rise of new cybergangs and the demise of others, […]
securityintelligence.webp 2018-01-30 06:30:42 Top Four Challenges That Can Create Tough Sledding for Your Data Security and Compliance Program (lien direct) A big data intelligence solution can free up security teams to focus on generating the data security and compliance insights business stakeholders demand in nearly real time.
securityintelligence.webp 2018-01-29 13:58:07 Highlights From the World Economic Forum\'s \'Global Risks Report 2018\' (lien direct) The World Economic Forum's "Global Risks Report 2018" warned of "the increased dangers of systemic breakdown" due to our overreliance on emerging technologies for critical systems and services.
securityintelligence.webp 2018-01-29 13:55:46 Creating an Incident Response Checklist to Prepare for a Data Breach (lien direct) When faced with an external attack or data breach, an organization is helpless unless it has an incident response plan firmly in place. The goal of such a plan is to minimize the damage of an attack, meaning that the recovery effort should take as little time as possible and avoid unnecessary costs, which include […]
securityintelligence.webp 2018-01-29 05:00:35 IBM Study: Consumers Weigh in on Biometrics, Authentication and the Future of Identity (lien direct) IBM Security's "Future of Identity Study" found that many consumers, especially millennials, are moving beyond passwords and using features such as biometric authentication to secure their identities.
securityintelligence.webp 2018-01-26 15:58:30 Is Your CISO a Jedi Warrior, an Admiral or a Diplomat? (lien direct) Take a look at some traits from the famous "Star Wars" characters we've grown to love and explore how those might be applicable to CISOs today.
securityintelligence.webp 2018-01-26 15:31:41 Choosing the Right Security Framework to Fit Your Business (lien direct) By adopting a hybrid security framework, organizations can cherry-pick the guidelines and compliance requirements that meet their unique business objectives.
securityintelligence.webp 2018-01-22 12:50:20 Data Risk Management, Part 2: Who Is Ultimately Accountable When a Big Breach Happens? (lien direct) By proactively determining who is responsible for data risk management before a data breach occurs, C-suite executives can help avoid such incidents in the first place.
securityintelligence.webp 2018-01-22 12:30:19 Building the Best Incident Response Team (lien direct) Building the right incident response team means looping in people outside of the IT and security teams.
securityintelligence.webp 2018-01-22 08:35:24 SecOps 2018: Cognitive Era and the Coming of GDPR (lien direct) As organizations prepare for GDPR in 2018, SecOps and cognitive technology will play crucial roles in helping to ensure improved security without compromising agility.
securityintelligence.webp 2018-01-19 12:50:17 No Degree, No Problem: Preparing Students for New Collar Jobs Through Alternative Education (lien direct) Many organizations across multiple sectors are creating new collar job opportunities to embrace the skills of aspiring professionals who lack traditional four-year college degrees.
Last update at: 2024-06-26 13:07:54
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter