What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2017-12-08 13:01:05 Cybersecurity, Fraud and Operational Risk: The Time for Cognitive Convergence Is Now (lien direct) The threat landscape is expanding, and organizations must undergo a cognitive convergence to manage evolving security, fraud and operational risks.
securityintelligence.webp 2017-12-07 13:16:12 What Does Secure Digital Transformation Mean to You? (lien direct) A secure digital transformation requires open lines of communication and collaboration between line of business executives and security leaders. Guideline ★★
securityintelligence.webp 2017-12-07 12:46:06 When Legacy Tools Fail, Next-Generation Antivirus Solutions Can Defuse Endpoint Security Risks (lien direct) Legacy antivirus tools require more resources to operate and are less effective than next-generation solutions at defusing endpoint security risks.
securityintelligence.webp 2017-12-07 12:11:07 Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition (lien direct) At IRISSCON 2017, 48 contestants across 12 teams battled it out in a free-for-all CTF competition to test their hacking, defending and forensics skills.
securityintelligence.webp 2017-12-06 21:16:04 IBM Security Increases Its Leadership Position in the Gartner 2017 SIEM Magic Quadrant (lien direct) IBM Security was named a leader in Gartner's 2017 Magic Quadrant for SIEM, an honor that reflects IBM's continued commitment to innovation in the field. Guideline
securityintelligence.webp 2017-12-06 13:01:03 Naughty or Nice? Why the Total Cost of E-Commerce Fraud Is Worse Than You Think (lien direct) For retailers who are primarily concerned with minimizing chargebacks, the total cost of e-commerce fraud is worse than they realize. ★★★★
securityintelligence.webp 2017-12-06 11:01:04 Teaming Up to Overhaul Authentication (lien direct) IBM is partnering with leading authentication providers to make it easier to integrate new authentication technologies with IBM Security Access Manager. Guideline
securityintelligence.webp 2017-12-05 18:36:02 The Evolution of the SIEM (lien direct) SIEM technology has evolved drastically over the past decade and will continue to mature as the threat landscape shifts and customers' needs change.
securityintelligence.webp 2017-12-05 15:26:05 IBM a Leader in \'The Forrester Wave: Enterprise Mobility Management, Q4 2017\' (lien direct) For the third straight time, IBM was recognized as a leader in "The Forrester Wave: Enterprise Mobility Management, Q4 2017" for its MaaS360 offering. Guideline
securityintelligence.webp 2017-12-05 12:51:03 Bringing Shadow IT Into the Security Light (lien direct) Shadow IT is created by employees accessing cloud services without prior approval, and it can be devastating to your enterprise's security posture.
securityintelligence.webp 2017-12-05 11:36:04 Infusing New Perspectives Into the Cybersecurity Workforce With a New Collar Approach (lien direct) A great way to bolster the dwindling cybersecurity workforce is to hire professionals who lack technical degrees but offer fresh perspectives.
securityintelligence.webp 2017-12-04 17:09:23 Loss Prevention Trends to Watch During the Holiday Shopping Season (lien direct) Physical theft accounted for two-thirds of inventory shrinkage in 2016, suggesting that retailers need to improve their loss prevention strategies.
securityintelligence.webp 2017-12-04 12:51:03 Let Silent Security Drive Your Identity and Access Management (lien direct) IBM Identity and Access Management (IAM) solutions deliver silent security, which enables analysts to protect your identity by monitoring behavioral data.
securityintelligence.webp 2017-12-04 10:15:59 Designing Your GDPR Plan: It\'s Time to Move From \'What\' to \'How\' (lien direct) After the Assess phase of your GDPR readiness journey, it's time to move onto the Design phase to determine how you'll achieve and maintain compliance.
securityintelligence.webp 2017-12-02 19:11:01 What\'s Behind the Rising Tide of Ransomware? (lien direct) The rate of ransomware is rising, largely due to the availability of exploit kits and ransomware-as-a-service (RaaS) packages in underground marketplaces.
securityintelligence.webp 2017-12-01 12:46:02 Improving Decision-Making in User Access Review and Cleanup Projects (lien direct) Machine learning algorithms can help security teams improve decision-making while conducting user access review and cleanup projects.
securityintelligence.webp 2017-11-30 13:21:08 The History and Reinvention of NAC (lien direct) Network access control (NAC) and enterprise networks themselves have come a long way in the past decade.
securityintelligence.webp 2017-11-30 12:41:02 The Case for Endpoint Detection and Response Tools: Why Traditional Protection Fails (lien direct) Following recent malware evolution, modern endpoint detection and response tools should not rely on just one trigger event, but on sophisticated logic.
securityintelligence.webp 2017-11-30 11:56:01 Securing Mobile Transactions and Payments in the Age of Connected Devices (lien direct) Simple security best practices can go a long way toward securing mobile transactions and payments for both consumers and service providers.
securityintelligence.webp 2017-11-29 13:01:03 Moving Target Defense: A Digital Shell Game (lien direct) Moving target defense constantly shifts the environment surrounding sensitive data, making it harder for would-be attackers to identify vulnerabilities.
securityintelligence.webp 2017-11-29 11:51:01 All Aboard! Applying the Security Immune System Approach to the Railroad Industry (lien direct) When it comes to protecting the railroad industry from cyberthreats, the security immune system approach can reduce incident triage from months to minutes.
securityintelligence.webp 2017-11-29 04:01:02 Three Steps to Secure Your AWS Environment Using IBM QRadar (lien direct) IBM QRadar can help you secure your AWS environment by checking for misconfigurations, monitoring for anomalous activity and curating content rules.
securityintelligence.webp 2017-11-28 16:06:00 Ursnif v3 Emerges, Targets Australian Bank Customers With Redirection Attacks (lien direct) A new cybergang operating a recent variant of the Ursnif Trojan has planted its flag in Australia, targeting banking customers with redirection attacks.
securityintelligence.webp 2017-11-28 12:51:03 Traveling This Holiday Season? Beware of RFID Attacks (lien direct) Consumers traveling during the holiday season should be aware of RFID attacks that could enable thieves to control their hotel key cards and digital locks.
securityintelligence.webp 2017-11-28 12:05:59 How Israel Became the Land of Connected Car Research and Development (lien direct) With its many manufacturer-sponsored test labs, smart car startups and military imperatives, Israel is becoming a major hub for connected car research.
securityintelligence.webp 2017-11-27 13:05:10 The \'Cracken\' in Action: A Password Cracking Adventure (lien direct) To maximize the horsepower of its password cracking system, the IBM X-Force team built its own hardware to aid in penetration testing efforts. ★★★★
securityintelligence.webp 2017-11-27 10:40:59 IoT Security: The Cold, Hard Truth About Digital Device Defense (lien direct) Is better digital device defense possible, or is securing the Internet of Things (IoT) an impossible task?
securityintelligence.webp 2017-11-27 10:25:59 Omnichannel Success Requires Retail Data Protections (lien direct) Omnichannel retailing is making shopping easier for consumers, but also presenting complexities to retailers.
securityintelligence.webp 2017-11-23 13:01:00 Innovation, Collaboration and Security Awareness: What We\'re Grateful for This Thanksgiving (lien direct) On this holiday, see what our contributors are thankful for in the world of cybersecurity, including improved security awareness and continued innovation.
securityintelligence.webp 2017-11-22 13:00:39 Cybersecurity Tips to Help Retailers and Consumers Stay Secure During the Holiday Season (lien direct) Consumers and retailers should implement these basic cybersecurity tips year-round to stay secure during the busy holiday shopping season.
securityintelligence.webp 2017-11-22 12:25:57 Aspects of Security We Need to Be Thankful For (lien direct) With the seemingly perpetual negativity surrounding security, there's still a lot to be thankful for and admire in today's environment.
securityintelligence.webp 2017-11-22 11:26:11 Canadian Business Banking Customers Hit With Targeted Phishing, Account Takeover Attacks (lien direct) A targeted phishing campaign aimed at Canadian businesses prompts users with high levels of access to divulge login credentials and authentication codes.
securityintelligence.webp 2017-11-21 13:15:57 Why Knock Innovation? SIEM Didn\'t Die - It Evolved (lien direct) SIEM has evolved from its comparatively humble beginnings to integrate user behavior analysis and log management capabilities that are critical to any SOC.
securityintelligence.webp 2017-11-21 12:40:59 Quit Your Day Job: Filling the Cybersecurity Skills Gap With Freelance Security Professionals (lien direct) Hiring freelancers can help companies close the cybersecurity skills gap, reduce overhead and infuse a fresh perspective into the organizational culture.
securityintelligence.webp 2017-11-21 12:05:56 \'Tis the Season for Retail Disruption (lien direct) Companies looking to minimize retail disruption during this holiday season should keep close tabs on emerging trends such as ransomware, the IoT and more. ★★★★
securityintelligence.webp 2017-11-20 13:11:04 Don\'t Let Network Complexity Tangle Up Your Security Strategy (lien direct) Overwhelmed network managers can significantly reduce network complexity by using automation in tandem with a well-defined policy.
securityintelligence.webp 2017-11-20 12:26:00 Wireless Security Lessons From the WPA2 Vulnerability (lien direct) One of the biggest WPA2 vulnerability wireless security lessons: Few people are aware, fewer know how to patch it and fewer still will do so.
securityintelligence.webp 2017-11-20 11:45:58 Take a Load Off: Delegate Cyber Risk Management Using the Three Lines of Defense Model (lien direct) The Three Lines of Defense model enables board directors to be involved in the cyber risk management process without micromanaging the security team.
securityintelligence.webp 2017-11-17 13:05:56 Why I Became an E-Resident of Estonia (lien direct) Estonia is leading the way in digital innovation, providing smart ID cards to its citizens to vote and interact with other public services. Guideline
securityintelligence.webp 2017-11-17 12:30:57 Fileless Malware Prompts Evolution of Endpoint Defenses (lien direct) A new generation of fileless malware has emerged, taking advantage of dynamic environments and prompting the need for more advanced defenses. ★★★★
securityintelligence.webp 2017-11-16 13:10:58 Steganography: A Safe Haven for Malware (lien direct) Steganography continues to be an incredibly versatile and effective method for obscuring or hiding information in plain sight.
securityintelligence.webp 2017-11-16 13:05:55 What to Know About the 2017 Gartner IAM Summit (lien direct) Looking forward to this year's Gartner IAM Summit in Las Vegas? Here's what you need to know to make the most of this conference.
securityintelligence.webp 2017-11-16 11:00:56 New Quad9 DNS Service Makes the Internet Safer and More Private (lien direct) Quad9 goes far beyond standard DNS name resolution to improve privacy, security scalability and ease of use.
securityintelligence.webp 2017-11-15 14:45:58 Software-Defined Security With SD-WAN (lien direct) It's no wonder organizations are embracing SD-WAN, which abstracts various connectivity options to provide a virtualized enterprise WAN.
securityintelligence.webp 2017-11-15 13:01:18 Don\'t Let a Retail Vulnerability Cause Holiday Havoc (lien direct) Stores and vendors must make sure they are minimizing the risk of a retail vulnerability ruining the holiday season.
securityintelligence.webp 2017-11-15 12:50:56 Data Storage and Encryption Should Top the CISO\'s To-Do List (lien direct) Before diving head-first into a data storage and encryption strategy, the CISO must decide which solutions best address the organization's unique needs.
securityintelligence.webp 2017-11-14 13:00:57 How Are ATMs Exploited? An Update on ATM Malware Methods (lien direct) ATM malware has evolved significantly in three years. ★★★★★
securityintelligence.webp 2017-11-14 12:50:55 Addressing Common Vulnerabilities and Security Gaps in the Oil and Gas Industry (lien direct) To close common security gaps in the oil and gas industry, IT leaders should educate employees, better manage remote devices and eschew standard products. Guideline
securityintelligence.webp 2017-11-14 12:40:58 Evolving Cloud-Native Applications Require New Best Practices (lien direct) As cloud-native applications become faster and more flexible, the security solutions that protect these applications must take on the same characteristics.
securityintelligence.webp 2017-11-13 15:01:22 The Ugly Duckling\'s Security Testing Transformation (lien direct) Some are wary of the Ugly Duckling due to his advanced hacking abilities, but when it comes to security testing, he's really one of the good guys. ★★
Last update at: 2024-06-26 13:07:54
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter