What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2017-11-13 14:55:08 The Grasshopper, the Ants and the Incident Response Plan (lien direct) The passive Grasshopper should be more like the Ants, who use IBM Resilient to support their robust and comprehensive incident response plan.
securityintelligence.webp 2017-11-13 11:01:06 New Banking Trojan IcedID Discovered by IBM X-Force Research (lien direct) IBM X-Force identified a new Trojan, dubbed IcedID, that uses advanced browser manipulation tactics to target financial institutions in the U.S. and U.K.
securityintelligence.webp 2017-11-10 13:15:54 IBM Leverages Retired Military Cybersecurity Expertise (lien direct) IBM is embracing the idea that retired military personnel can help fill the cyber skills gap and serve as leaders in the security industry. Guideline
securityintelligence.webp 2017-11-10 12:30:55 Boots on the Ground: New Collar Careers Bring Military Veterans to the Cybersecurity Battlefield (lien direct) Military veterans are prime candidates for new collar careers in cybersecurity because leadership and incident response are built into their training. Guideline
securityintelligence.webp 2017-11-09 13:10:56 Don\'t Worry About the KRACK Vulnerability - Just Create a Team of Superheroes! (lien direct) There is no silver bullet to thwart the KRACK vulnerability, but a security intelligence platform can help analysts become security superheroes.
securityintelligence.webp 2017-11-09 12:45:56 Overcoming Common Roadblocks on Your Digital Transformation Journey (lien direct) Companies that impact cultural change, keep their systems up to date and retain cyber talent have a leg up when it comes to digital transformation. ★★
securityintelligence.webp 2017-11-09 12:35:58 Making the Case for Containment With WIP (lien direct) When integrated with a UEM solution by default, Windows Information Protection (WIP) acts as its own container and maintains a native user experience.
securityintelligence.webp 2017-11-08 13:25:53 Don\'t Go It Alone: Building Relationships and Sharing Threat Intelligence for the Common Good (lien direct) Companies across all verticals can diminish the impact of widespread cyberthreats by forging collaborative partnerships and sharing threat intelligence.
securityintelligence.webp 2017-11-08 12:41:04 Overlay RAT Malware Uses AutoIt Scripting to Bypass Antivirus Detection (lien direct) IBM X-Force discovered a new overlay RAT malware that exploits the AutoIt framework to evade antivirus detection while perpetrating bank fraud in Brazil.
securityintelligence.webp 2017-11-08 12:31:03 Proactive or Reactive Endpoint Security? A Critical Crossroads for SOC Analysts (lien direct) As the cybercrime landscape expands, SOC teams need endpoint security tools that can reduce the time it takes to gain actionable threat intelligence.
securityintelligence.webp 2017-11-07 13:45:55 SecDevOps: Putting Security at the Heart of DevOps (lien direct) A SecDevOps cycle can help companies accelerate the development process, reduce code vulnerabilities and bridge the gap between agility and security.
securityintelligence.webp 2017-11-07 13:00:54 The Power of Embracing Change: Why Mobile Payments Are More Secure Than You Think (lien direct) Although mobile payments are more convenient and arguably more secure than carrying physical credit cards, both retailers and consumers remain wary. ★★★
securityintelligence.webp 2017-11-07 12:35:55 Access Management Resolution: Consolidating Actionable Access Data on a Single Pane of Glass (lien direct) Using several disparate tools for access management can create a fractured view of access data, decrease productivity and promote insecure behaviors.
securityintelligence.webp 2017-11-06 14:11:00 How Not to Store Passwords: SHA-1 Fails Again (lien direct) Symmetric key encryption, password hashing and SHA-1 are all ineffective ways to store passwords during the software development stage.
securityintelligence.webp 2017-11-06 12:20:58 Securing Medical Devices in the Age of the IoT (lien direct) Both health care IT professionals and device manufacturers are responsible for securing medical devices in light of emerging IoT threats.
securityintelligence.webp 2017-11-06 09:06:19 Getting a Grip on GDPR: The Secret Is Knowing Where to Begin (lien direct) IBM's GDPR readiness assessment helps organizations gauge their maturity level and identify steps to achieve and maintain compliance. ★★★
securityintelligence.webp 2017-11-03 11:25:51 The Power and Versatility of Pervasive Encryption (lien direct) Pervasive encryption is a powerful, customizable feature of the IBM z14 mainframe that enables security teams to protect all data and maintain compliance.
securityintelligence.webp 2017-11-02 12:45:57 Injection Attacks: The Least Glamorous Attack Is One of the Most Threatening (lien direct) They may not grab the most headlines, but injection attacks are the most common threats targeting organizational networks, according to IBM MSS data. ★★★
securityintelligence.webp 2017-11-02 12:45:52 Diving Deeper to Understand, Investigate and Mitigate Cyberthreats (lien direct) Investigative analysis tools enable SOC teams to proactively hunt for and mitigate cyberthreats instead of meticulously collecting and curating data.
securityintelligence.webp 2017-11-02 11:00:54 What Can We Learn From the \'Global State of Information Security Survey 2018\'? (lien direct) While PwC's "Global State of Information Security Survey" noted that governments have improved cyber resilience, businesses still have a long way to go.
securityintelligence.webp 2017-11-01 12:31:03 Accelerate the Value Gain With Identity Governance and Administration (lien direct) The B-2-C-12 formula enables security professionals to demonstrate the value gain of their identity governance and administration investments faster.
securityintelligence.webp 2017-11-01 11:40:53 Open Banking Is Here - Is Your Bank Positioned to Lead? (lien direct) Open banking is changing the way people manage their money, transforming the relationship between customers and financial institutions.
securityintelligence.webp 2017-11-01 11:15:51 CIAM Vendors Report: IBM Cloud Identity Service Named Market Leader in Consumer IAM Leadership Compass (lien direct) IBM Cloud Identity Service was named a Market Leader among CIAM vendors in the most recent IAM Leadership Compass. Guideline
securityintelligence.webp 2017-10-31 15:00:52 Don\'t Be Catfished: Protecting Yourself From New Account Fraud (lien direct) While consumers can't change their personal information, they can take preventative measures to protect their data from new account fraud.
securityintelligence.webp 2017-10-31 11:31:06 Nine More NCSAM Tips for Cybersecurity Professionals: Week Four (lien direct) What have you learned during the National Cyber Security Awareness Month (NCSAM) that could help boost your organization's security posture?
securityintelligence.webp 2017-10-31 09:00:52 Massive Identity Data Exposure Leads to Rising Tides of New Account Fraud - What\'s Next? (lien direct) New account fraud is rising in popularity among cybercriminals due to the frequency with which users are opening new online banking accounts.
securityintelligence.webp 2017-10-30 13:00:53 Security Awareness Training Is a Team Effort (lien direct) To promote security awareness throughout the organization, CISOs should invite employees in disparate departments to help design training materials.
securityintelligence.webp 2017-10-30 11:55:50 Addressing the Clear and Present Danger of an Electrical Power Grid Breach (lien direct) Government agencies and companies in the energy and utilities sector must replace legacy equipment to avoid a potentially devastating power grid breach.
securityintelligence.webp 2017-10-30 11:10:53 Don\'t Panic! Create a Winning Cybersecurity Strategy to Preserve CISO Sanity (lien direct) To deal with the daily pressures of the job, CISOs need a cybersecurity strategy that promotes cross-departmental collaboration and clear communication.
securityintelligence.webp 2017-10-27 12:30:52 Investigating IoT Crime in the Age of Connected Devices (lien direct) To fight IoT crime, security professionals must properly classify incidents and connect seemingly disparate strings of evidence.
securityintelligence.webp 2017-10-27 12:00:57 It Takes All Kinds: Identifying New Sources of Cybersecurity Talent (lien direct) Companies struggling to cope with the IT skills gap can find cybersecurity talent in unlikely places, such as hacking competitions and the armed forces.
securityintelligence.webp 2017-10-27 11:20:53 The Blockchain Is Only as Strong as Its Weakest Link (lien direct) Blockchain technology depends on mutual trust between human participants, each of whom represents a potential weakness in the chain.
securityintelligence.webp 2017-10-26 12:31:00 Financial Institutions Join Forces to Solve the Intensifying Cloud Compliance Dilemma (lien direct) The intensifying of cloud compliance requirements has become a major hindrance to financial institutions' growth and innovation.
securityintelligence.webp 2017-10-26 11:35:48 Unexpectedly Useful Skills for Careers in Cybersecurity (lien direct) Seemingly unrelated skills - such as untangling yarn, herding cats and cataloging toys - can benefit people looking to start careers in cybersecurity.
securityintelligence.webp 2017-10-26 08:45:55 Ursnif Campaign Waves Breaking on Japanese Shores (lien direct) The Ursnif banking Trojan began targeting financial institutions in Japan during Q3 2017 and continues to operate in the region as we enter Q4.
securityintelligence.webp 2017-10-25 18:05:49 Bad Rabbit Ransomware Attacks Highlight Risk of Propagating Malware Outbreaks (lien direct) Companies in Russia and Ukraine suffered a widespread attack known as Bad Rabbit that directed victims to a Dark Web site to pay for their stolen files.
securityintelligence.webp 2017-10-25 11:45:52 Threat Intelligence: A Tear-Free Solution to Help SOC Analysis Prepare for the Next WannaCry (lien direct) An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware. Wannacry
securityintelligence.webp 2017-10-25 10:50:50 Employees Must Wash Hands: 11 Tips to Translate Awareness Into Better Security Hygiene (lien direct) Due to an influx of high-profile data breaches, employees are more security-aware than ever. But that doesn't always translate to good security hygiene.
securityintelligence.webp 2017-10-23 17:34:32 Goldilocks Finds an Identity and Access Management Solution That Is Just Right (lien direct) Goldilocks needs an identity and access management solution that provides not too much, not too little, but just the right level of access.
securityintelligence.webp 2017-10-23 17:34:25 Grandma or the Wolf? Red Gets Smart About Fraud Protection (lien direct) When Red spots suspicious activity on Grandma's account, she needs a dynamic fraud protection tool to determine whether it's really her or a Big Bad Wolf.
securityintelligence.webp 2017-10-23 17:33:49 Enterprise Mobility Management Even the Apprentice Can Control (lien direct) To secure a full-time position at the end of his internship, the Apprentice must design an effective enterprise mobility management strategy.
securityintelligence.webp 2017-10-23 12:00:57 Another Eight NCSAM Tips for Cybersecurity Professionals: Week Three (lien direct) NCSAM is a great opportunity to improve your security training program, review the tools you use, and test your cybersecurity plans and processes.
securityintelligence.webp 2017-10-23 11:50:52 Three Tips to Help Your Organization Hit Data Protection Out of the Park (lien direct) Although data protection is crucial to the success of any business, many employees still circumvent security policies they mistakenly deem superfluous.
securityintelligence.webp 2017-10-20 12:00:51 Don\'t Let Organizational Politics Derail Security Initiatives (lien direct) For IT professionals, gaining executive buy-in for information security initiatives requires masterful navigation of organizational politics.
securityintelligence.webp 2017-10-20 09:40:47 In Its Fifth Year, European Cyber Security Month Shows Why Security Is a Shared Responsibility (lien direct) European Cyber Security Month aims to increase awareness about cybersecurity and emphasize the message that security is a shared responsibility.
securityintelligence.webp 2017-10-19 12:10:49 Pick a Card, Any Card: Deception, the Human Mind and the Social Engineering Challenge (lien direct) Social engineering schemes such as spear phishing rely on the human mind's inclination toward self-deception to motivate users to open malicious links.
securityintelligence.webp 2017-10-19 11:30:49 Your Security Awareness Program Stinks. Here\'s Something You Can Do About It (lien direct) IT leaders should eschew traditional, dry security awareness training materials for entertaining content that encourages stronger user engagement. Guideline
securityintelligence.webp 2017-10-18 12:10:49 How to Increase Transparency and Rebuild Trust After a Data Breach (lien direct) In the wake of a data breach, organizations should strive to be as transparent and responsive as possible to rebuild customer trust.
securityintelligence.webp 2017-10-18 11:35:50 Five Key IT Security Best Practices to Safeguard Your Expanding Business (lien direct) Owners of small and medium-sized businesses (SMBs) should follow these IT security best practices to protect their data and gain a competitive advantage.
securityintelligence.webp 2017-10-17 12:55:45 Practice: The Best Defense for Responding to Cyber Incidents (lien direct) When it comes to defending an organization against cyberattacks and their aftershocks, the best way to shore up incident response is to practice.
Last update at: 2024-06-29 06:07:30
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter