Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2017-11-13 14:55:08 |
The Grasshopper, the Ants and the Incident Response Plan (lien direct) |
The passive Grasshopper should be more like the Ants, who use IBM Resilient to support their robust and comprehensive incident response plan.
|
|
|
|
|
2017-11-13 11:01:06 |
New Banking Trojan IcedID Discovered by IBM X-Force Research (lien direct) |
IBM X-Force identified a new Trojan, dubbed IcedID, that uses advanced browser manipulation tactics to target financial institutions in the U.S. and U.K.
|
|
|
|
|
2017-11-10 13:15:54 |
IBM Leverages Retired Military Cybersecurity Expertise (lien direct) |
IBM is embracing the idea that retired military personnel can help fill the cyber skills gap and serve as leaders in the security industry.
|
Guideline
|
|
|
|
2017-11-10 12:30:55 |
Boots on the Ground: New Collar Careers Bring Military Veterans to the Cybersecurity Battlefield (lien direct) |
Military veterans are prime candidates for new collar careers in cybersecurity because leadership and incident response are built into their training.
|
Guideline
|
|
|
|
2017-11-09 13:10:56 |
Don\'t Worry About the KRACK Vulnerability - Just Create a Team of Superheroes! (lien direct) |
There is no silver bullet to thwart the KRACK vulnerability, but a security intelligence platform can help analysts become security superheroes.
|
|
|
|
|
2017-11-09 12:45:56 |
Overcoming Common Roadblocks on Your Digital Transformation Journey (lien direct) |
Companies that impact cultural change, keep their systems up to date and retain cyber talent have a leg up when it comes to digital transformation.
|
|
|
★★
|
|
2017-11-09 12:35:58 |
Making the Case for Containment With WIP (lien direct) |
When integrated with a UEM solution by default, Windows Information Protection (WIP) acts as its own container and maintains a native user experience.
|
|
|
|
|
2017-11-08 13:25:53 |
Don\'t Go It Alone: Building Relationships and Sharing Threat Intelligence for the Common Good (lien direct) |
Companies across all verticals can diminish the impact of widespread cyberthreats by forging collaborative partnerships and sharing threat intelligence.
|
|
|
|
|
2017-11-08 12:41:04 |
Overlay RAT Malware Uses AutoIt Scripting to Bypass Antivirus Detection (lien direct) |
IBM X-Force discovered a new overlay RAT malware that exploits the AutoIt framework to evade antivirus detection while perpetrating bank fraud in Brazil.
|
|
|
|
|
2017-11-08 12:31:03 |
Proactive or Reactive Endpoint Security? A Critical Crossroads for SOC Analysts (lien direct) |
As the cybercrime landscape expands, SOC teams need endpoint security tools that can reduce the time it takes to gain actionable threat intelligence.
|
|
|
|
|
2017-11-07 13:45:55 |
SecDevOps: Putting Security at the Heart of DevOps (lien direct) |
A SecDevOps cycle can help companies accelerate the development process, reduce code vulnerabilities and bridge the gap between agility and security.
|
|
|
|
|
2017-11-07 13:00:54 |
The Power of Embracing Change: Why Mobile Payments Are More Secure Than You Think (lien direct) |
Although mobile payments are more convenient and arguably more secure than carrying physical credit cards, both retailers and consumers remain wary.
|
|
|
★★★
|
|
2017-11-07 12:35:55 |
Access Management Resolution: Consolidating Actionable Access Data on a Single Pane of Glass (lien direct) |
Using several disparate tools for access management can create a fractured view of access data, decrease productivity and promote insecure behaviors.
|
|
|
|
|
2017-11-06 14:11:00 |
How Not to Store Passwords: SHA-1 Fails Again (lien direct) |
Symmetric key encryption, password hashing and SHA-1 are all ineffective ways to store passwords during the software development stage.
|
|
|
|
|
2017-11-06 12:20:58 |
Securing Medical Devices in the Age of the IoT (lien direct) |
Both health care IT professionals and device manufacturers are responsible for securing medical devices in light of emerging IoT threats.
|
|
|
|
|
2017-11-06 09:06:19 |
Getting a Grip on GDPR: The Secret Is Knowing Where to Begin (lien direct) |
IBM's GDPR readiness assessment helps organizations gauge their maturity level and identify steps to achieve and maintain compliance.
|
|
|
★★★
|
|
2017-11-03 11:25:51 |
The Power and Versatility of Pervasive Encryption (lien direct) |
Pervasive encryption is a powerful, customizable feature of the IBM z14 mainframe that enables security teams to protect all data and maintain compliance.
|
|
|
|
|
2017-11-02 12:45:57 |
Injection Attacks: The Least Glamorous Attack Is One of the Most Threatening (lien direct) |
They may not grab the most headlines, but injection attacks are the most common threats targeting organizational networks, according to IBM MSS data.
|
|
|
★★★
|
|
2017-11-02 12:45:52 |
Diving Deeper to Understand, Investigate and Mitigate Cyberthreats (lien direct) |
Investigative analysis tools enable SOC teams to proactively hunt for and mitigate cyberthreats instead of meticulously collecting and curating data.
|
|
|
|
|
2017-11-02 11:00:54 |
What Can We Learn From the \'Global State of Information Security Survey 2018\'? (lien direct) |
While PwC's "Global State of Information Security Survey" noted that governments have improved cyber resilience, businesses still have a long way to go.
|
|
|
|
|
2017-11-01 12:31:03 |
Accelerate the Value Gain With Identity Governance and Administration (lien direct) |
The B-2-C-12 formula enables security professionals to demonstrate the value gain of their identity governance and administration investments faster.
|
|
|
|
|
2017-11-01 11:40:53 |
Open Banking Is Here - Is Your Bank Positioned to Lead? (lien direct) |
Open banking is changing the way people manage their money, transforming the relationship between customers and financial institutions.
|
|
|
|
|
2017-11-01 11:15:51 |
CIAM Vendors Report: IBM Cloud Identity Service Named Market Leader in Consumer IAM Leadership Compass (lien direct) |
IBM Cloud Identity Service was named a Market Leader among CIAM vendors in the most recent IAM Leadership Compass.
|
Guideline
|
|
|
|
2017-10-31 15:00:52 |
Don\'t Be Catfished: Protecting Yourself From New Account Fraud (lien direct) |
While consumers can't change their personal information, they can take preventative measures to protect their data from new account fraud.
|
|
|
|
|
2017-10-31 11:31:06 |
Nine More NCSAM Tips for Cybersecurity Professionals: Week Four (lien direct) |
What have you learned during the National Cyber Security Awareness Month (NCSAM) that could help boost your organization's security posture?
|
|
|
|
|
2017-10-31 09:00:52 |
Massive Identity Data Exposure Leads to Rising Tides of New Account Fraud - What\'s Next? (lien direct) |
New account fraud is rising in popularity among cybercriminals due to the frequency with which users are opening new online banking accounts.
|
|
|
|
|
2017-10-30 13:00:53 |
Security Awareness Training Is a Team Effort (lien direct) |
To promote security awareness throughout the organization, CISOs should invite employees in disparate departments to help design training materials.
|
|
|
|
|
2017-10-30 11:55:50 |
Addressing the Clear and Present Danger of an Electrical Power Grid Breach (lien direct) |
Government agencies and companies in the energy and utilities sector must replace legacy equipment to avoid a potentially devastating power grid breach.
|
|
|
|
|
2017-10-30 11:10:53 |
Don\'t Panic! Create a Winning Cybersecurity Strategy to Preserve CISO Sanity (lien direct) |
To deal with the daily pressures of the job, CISOs need a cybersecurity strategy that promotes cross-departmental collaboration and clear communication.
|
|
|
|
|
2017-10-27 12:30:52 |
Investigating IoT Crime in the Age of Connected Devices (lien direct) |
To fight IoT crime, security professionals must properly classify incidents and connect seemingly disparate strings of evidence.
|
|
|
|
|
2017-10-27 12:00:57 |
It Takes All Kinds: Identifying New Sources of Cybersecurity Talent (lien direct) |
Companies struggling to cope with the IT skills gap can find cybersecurity talent in unlikely places, such as hacking competitions and the armed forces.
|
|
|
|
|
2017-10-27 11:20:53 |
The Blockchain Is Only as Strong as Its Weakest Link (lien direct) |
Blockchain technology depends on mutual trust between human participants, each of whom represents a potential weakness in the chain.
|
|
|
|
|
2017-10-26 12:31:00 |
Financial Institutions Join Forces to Solve the Intensifying Cloud Compliance Dilemma (lien direct) |
The intensifying of cloud compliance requirements has become a major hindrance to financial institutions' growth and innovation.
|
|
|
|
|
2017-10-26 11:35:48 |
Unexpectedly Useful Skills for Careers in Cybersecurity (lien direct) |
Seemingly unrelated skills - such as untangling yarn, herding cats and cataloging toys - can benefit people looking to start careers in cybersecurity.
|
|
|
|
|
2017-10-26 08:45:55 |
Ursnif Campaign Waves Breaking on Japanese Shores (lien direct) |
The Ursnif banking Trojan began targeting financial institutions in Japan during Q3 2017 and continues to operate in the region as we enter Q4.
|
|
|
|
|
2017-10-25 18:05:49 |
Bad Rabbit Ransomware Attacks Highlight Risk of Propagating Malware Outbreaks (lien direct) |
Companies in Russia and Ukraine suffered a widespread attack known as Bad Rabbit that directed victims to a Dark Web site to pay for their stolen files.
|
|
|
|
|
2017-10-25 11:45:52 |
Threat Intelligence: A Tear-Free Solution to Help SOC Analysis Prepare for the Next WannaCry (lien direct) |
An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware.
|
|
Wannacry
|
|
|
2017-10-25 10:50:50 |
Employees Must Wash Hands: 11 Tips to Translate Awareness Into Better Security Hygiene (lien direct) |
Due to an influx of high-profile data breaches, employees are more security-aware than ever. But that doesn't always translate to good security hygiene.
|
|
|
|
|
2017-10-23 17:34:32 |
Goldilocks Finds an Identity and Access Management Solution That Is Just Right (lien direct) |
Goldilocks needs an identity and access management solution that provides not too much, not too little, but just the right level of access.
|
|
|
|
|
2017-10-23 17:34:25 |
Grandma or the Wolf? Red Gets Smart About Fraud Protection (lien direct) |
When Red spots suspicious activity on Grandma's account, she needs a dynamic fraud protection tool to determine whether it's really her or a Big Bad Wolf.
|
|
|
|
|
2017-10-23 17:33:49 |
Enterprise Mobility Management Even the Apprentice Can Control (lien direct) |
To secure a full-time position at the end of his internship, the Apprentice must design an effective enterprise mobility management strategy.
|
|
|
|
|
2017-10-23 12:00:57 |
Another Eight NCSAM Tips for Cybersecurity Professionals: Week Three (lien direct) |
NCSAM is a great opportunity to improve your security training program, review the tools you use, and test your cybersecurity plans and processes.
|
|
|
|
|
2017-10-23 11:50:52 |
Three Tips to Help Your Organization Hit Data Protection Out of the Park (lien direct) |
Although data protection is crucial to the success of any business, many employees still circumvent security policies they mistakenly deem superfluous.
|
|
|
|
|
2017-10-20 12:00:51 |
Don\'t Let Organizational Politics Derail Security Initiatives (lien direct) |
For IT professionals, gaining executive buy-in for information security initiatives requires masterful navigation of organizational politics.
|
|
|
|
|
2017-10-20 09:40:47 |
In Its Fifth Year, European Cyber Security Month Shows Why Security Is a Shared Responsibility (lien direct) |
European Cyber Security Month aims to increase awareness about cybersecurity and emphasize the message that security is a shared responsibility.
|
|
|
|
|
2017-10-19 12:10:49 |
Pick a Card, Any Card: Deception, the Human Mind and the Social Engineering Challenge (lien direct) |
Social engineering schemes such as spear phishing rely on the human mind's inclination toward self-deception to motivate users to open malicious links.
|
|
|
|
|
2017-10-19 11:30:49 |
Your Security Awareness Program Stinks. Here\'s Something You Can Do About It (lien direct) |
IT leaders should eschew traditional, dry security awareness training materials for entertaining content that encourages stronger user engagement.
|
Guideline
|
|
|
|
2017-10-18 12:10:49 |
How to Increase Transparency and Rebuild Trust After a Data Breach (lien direct) |
In the wake of a data breach, organizations should strive to be as transparent and responsive as possible to rebuild customer trust.
|
|
|
|
|
2017-10-18 11:35:50 |
Five Key IT Security Best Practices to Safeguard Your Expanding Business (lien direct) |
Owners of small and medium-sized businesses (SMBs) should follow these IT security best practices to protect their data and gain a competitive advantage.
|
|
|
|
|
2017-10-17 12:55:45 |
Practice: The Best Defense for Responding to Cyber Incidents (lien direct) |
When it comes to defending an organization against cyberattacks and their aftershocks, the best way to shore up incident response is to practice.
|
|
|
|