What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.png 2019-03-25 16:40:02 Adopting the NIST 800-53 Control Framework? Learn More About the Anticipated Changes in 2019 (lien direct)

>Organizations adopting NIST 800-53 should understand how upcoming changes will affect senior leadership accountability, data privacy and third-party assessments.

The post Adopting the NIST 800-53 Control Framework? Learn More About the Anticipated Changes in 2019 appeared first on Security Intelligence.

securityintelligence.png 2019-03-25 12:10:02 Think Inside the Box to Bridge the Cybersecurity Skills Gap (lien direct)

>The threat landscape is growing more perilous each day and our white hats need all the help they can get. The problem is that many organizations are struggling to close the cybersecurity skills gap.

The post Think Inside the Box to Bridge the Cybersecurity Skills Gap appeared first on Security Intelligence.

securityintelligence.png 2019-03-22 14:25:03 Vulnerability Assessments Versus Penetration Tests: A Common Misconception (lien direct)

>Vendors, cybersecurity professionals and marketing teams often use the terms "penetration testing" and "vulnerability assessment" interchangeably, mixing two completely different security engagements.

The post Vulnerability Assessments Versus Penetration Tests: A Common Misconception appeared first on Security Intelligence.

securityintelligence.png 2019-03-22 13:00:03 Taming Global Cybersecurity Risks Requires a Concerted Cyber Resilience Effort (lien direct)

>With the realization that "we\'re all in this together," boards want to learn how their organizations are collaborating with the rest of the ecosystem in planning and testing cyber resilience.

The post Taming Global Cybersecurity Risks Requires a Concerted Cyber Resilience Effort appeared first on Security Intelligence.

securityintelligence.png 2019-03-21 20:26:01 5 Characteristics of an Effective Incident Response Team: Lessons From the Front Line (lien direct)

>How you respond to a data breach matters. What qualities do the most elite incident response teams possess? The IBM X-Force IRIS team shares its lessons from the front line.

The post 5 Characteristics of an Effective Incident Response Team: Lessons From the Front Line appeared first on Security Intelligence.

securityintelligence.png 2019-03-21 12:30:03 Hunting for the True Meaning of Threat Hunting at RSAC 2019 (lien direct)

>Many vendors at RSAC 2019 boasted of their advanced and even automated threat hunting capabilities, but it\'s important to understand the difference between true threat hunting and marketing jargon.

The post Hunting for the True Meaning of Threat Hunting at RSAC 2019 appeared first on Security Intelligence.

securityintelligence.png 2019-03-21 12:00:02 What Security Threats of the Past Can Tell Us About the Future of Cybersecurity (lien direct)

>If we look close enough, many new security threats are something we\'ve seen in another form or an attack style we\'ve had to previously defend against.

The post What Security Threats of the Past Can Tell Us About the Future of Cybersecurity appeared first on Security Intelligence.

securityintelligence.png 2019-03-21 11:30:02 Securing the Microservices Architecture: Decomposing the Monolith Without Compromising Information Security (lien direct)

>Ditching monolith for microservices may be right for your organization, but it\'s critical to address the relevant security considerations early in the process.

The post Securing the Microservices Architecture: Decomposing the Monolith Without Compromising Information Security appeared first on Security Intelligence.

securityintelligence.png 2019-03-20 13:00:02 Creating Meaningful Diversity of Thought in the Cybersecurity Workforce (lien direct)

>Let\'s add the diversity of approach, diversity of values and advocacy for deep customer empathy to the cybersecurity workforce diversity we are building.

The post Creating Meaningful Diversity of Thought in the Cybersecurity Workforce appeared first on Security Intelligence.

securityintelligence.png 2019-03-20 10:00:02 The Business of Organized Cybercrime: Rising Intergang Collaboration in 2018 (lien direct)

>In 2018, IBM X-Force researchers observed organized cybercrime groups collaborating, rather than competing over turf or even attacking each other, for the first time.

The post The Business of Organized Cybercrime: Rising Intergang Collaboration in 2018 appeared first on Security Intelligence.

securityintelligence.png 2019-03-19 12:00:02 Why You Should Integrate IoT Security Into Your Vulnerability Management Program (lien direct)

>Many IT professionals and executives alike are not addressing IoT security at the same level at which it\'s creating tangible business risks.

The post Why You Should Integrate IoT Security Into Your Vulnerability Management Program appeared first on Security Intelligence.

securityintelligence.png 2019-03-18 12:45:01 The Biggest Stories From RSAC 2019: What Scares the Cybersecurity Experts? (lien direct)

>When the perspectives of CISOs and experts at RSAC 2019 are viewed as a continuum, you can begin to see a story emerging about the state of cybersecurity in 2019.

The post The Biggest Stories From RSAC 2019: What Scares the Cybersecurity Experts? appeared first on Security Intelligence.

securityintelligence.png 2019-03-15 20:45:02 How Patch Posture Reporting Improves Security Landscapes (lien direct)

>If your vulnerability management tools do not report on your company\'s patch posture, you may be missing crucial holes in your software that are ripe for exploitation.

The post How Patch Posture Reporting Improves Security Landscapes appeared first on Security Intelligence.

securityintelligence.png 2019-03-15 13:55:01 Will We See the Rise of Vaporworms and Other New Fileless Attacks in 2019? (lien direct)

>The evolution of the new and difficult-to-detect category of fileless malware may soon take an insidious turn with the development of what some researchers are calling vaporworms.

The post Will We See the Rise of Vaporworms and Other New Fileless Attacks in 2019? appeared first on Security Intelligence.

securityintelligence.png 2019-03-14 18:15:02 Application Security Has Nothing to Do With Luck (lien direct)

>If a safe, secure product and a satisfied customer base is the pot of gold at the end of your rainbow, it\'s time to build application security processes into your development cycle.

The post Application Security Has Nothing to Do With Luck appeared first on Security Intelligence.

securityintelligence.png 2019-03-14 16:25:01 Breaking Down the Incident Notification Requirements in the EU\'s NIS Directive (lien direct)

Similar to the GDPR, you can approach the NIS Directive as a roadblock or a nuisance, or you can consider it an excellent opportunity to improve your security posture.

The post Breaking Down the Incident Notification Requirements in the EU’s NIS Directive appeared first on Security Intelligence.

securityintelligence.png 2019-03-13 16:10:02 With AI for Cybersecurity, We Are Raising the Bar for Smart (lien direct)

>It\'s hard to believe a computer that couldn\'t read a newspaper was once considered smart. But as recent innovations in AI for cybersecurity have shown, we are constantly raising the bar for smart.

The post With AI for Cybersecurity, We Are Raising the Bar for Smart appeared first on Security Intelligence.

securityintelligence.png 2019-03-13 12:20:02 How CISOs Can Facilitate the Advent of the Cognitive Enterprise (lien direct)

>Just as organizations get comfortable with leveraging the cloud, another wave of digital disruption is on the horizon: artificial intelligence and its ability to drive the cognitive enterprise.

The post How CISOs Can Facilitate the Advent of the Cognitive Enterprise appeared first on Security Intelligence.

securityintelligence.png 2019-03-12 13:30:02 Spectre, Meltdown and More: What You Need to Know About Hardware Vulnerabilities (lien direct)

>According to IBM X-Force IRIS research, threat actors will continue to search for ways to leverage Spectre, Meltdown and other hardware vulnerabilities to steal data in the coming years.

The post Spectre, Meltdown and More: What You Need to Know About Hardware Vulnerabilities appeared first on Security Intelligence.

securityintelligence.png 2019-03-12 12:00:02 An Apple a Day Won\'t Improve Your Security Hygiene, But a Cyber Doctor Might (lien direct)

Internal assessments and audits are necessary, but they have their limitations. Some outside assistance could help improve your security hygiene and inoculate you from the nastiest of cyber bugs.

The post An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might appeared first on Security Intelligence.

securityintelligence.png 2019-03-11 12:00:02 Security Considerations for Whatever Cloud Service Model You Adopt (lien direct)

>Regardless of what cloud service model you adopt, it\'s important to consider security implications related to application development, data and contract management, and IT asset governance.

The post Security Considerations for Whatever Cloud Service Model You Adopt appeared first on Security Intelligence.

securityintelligence.png 2019-03-08 20:40:02 Women in Security Speak Out at RSAC 2019, But There\'s Still a Long Way to Go (lien direct)

At RSAC 2019, IBM Security General Manager Mary O\'Brien noted that while the industry has made progress toward improving the experience of women in security, "a little better isn\'t going to cut it."

The post Women in Security Speak Out at RSAC 2019, But There’s Still a Long Way to Go appeared first on Security Intelligence.

securityintelligence.png 2019-03-08 17:55:02 At RSAC 2019, It\'s Clear the World Needs More Public Interest Technologists (lien direct)

In a world where technology and culture are one and the same, public-interest technologists are critical to a better future.

The post At RSAC 2019, It’s Clear the World Needs More Public Interest Technologists appeared first on Security Intelligence.

securityintelligence.png 2019-03-08 13:30:05 Celebrating International Women\'s Day: Why We Need Better Representation of Women in Security (lien direct)

This International Women\'s Day, we celebrate the accomplishments of some of the most influential women in security and explore ways to expose more girls and young women to cyber careers.

The post Celebrating International Women’s Day: Why We Need Better Representation of Women in Security appeared first on Security Intelligence.

securityintelligence.png 2019-03-07 13:05:02 Comprehensive Vulnerability Management in Connected Security Solutions (lien direct)

>To stay ahead of attackers, organizations should consider vulnerability management solutions that integrate with SIEM tools, network and threat modeling capabilities, and patch management systems.

The post Comprehensive Vulnerability Management in Connected Security Solutions appeared first on Security Intelligence.

securityintelligence.png 2019-03-07 13:00:02 It\'s Time for an Automotive Cybersecurity Wake-Up Call (lien direct)

The car of today - and especially tomorrow - relies on countless lines of software code to get those wheels moving, a reality that has placed increasing importance on automotive cybersecurity.

The post It’s Time for an Automotive Cybersecurity Wake-Up Call appeared first on Security Intelligence.

securityintelligence.png 2019-03-06 13:00:02 Don\'t Believe Your Eyes: Deepfake Videos Are Coming to Fool Us All (lien direct)

Deepfake videos that are indistinguishable from authentic videos are coming, and we can scarcely imagine what they\'ll be used for. We should start preparing for the worst.

The post Don’t Believe Your Eyes: Deepfake Videos Are Coming to Fool Us All appeared first on Security Intelligence.

securityintelligence.png 2019-03-05 14:15:02 Spring Cleaning for CISOs: Replace These 3 Bad Habits With Better Cybersecurity Practices (lien direct)

>Spring is just around the corner, which means it\'s time for CISOs to evaluate their security strategy, eliminate processes that aren\'t working, and adopt new cybersecurity practices and technologies.

The post Spring Cleaning for CISOs: Replace These 3 Bad Habits With Better Cybersecurity Practices appeared first on Security Intelligence.

securityintelligence.png 2019-03-05 14:00:02 How to Accelerate Your Cloud IAM Adoption (lien direct)

>Moving identity management processes to cloud IAM services introduces benefits such as cost-efficiency, flexibility, faster deployments and simplified operations.

The post How to Accelerate Your Cloud IAM Adoption appeared first on Security Intelligence.

securityintelligence.png 2019-03-05 11:00:02 Blockchain: Making the Reward Much Greater Than the Risk (lien direct)

>The decentralized nature of blockchain, coupled with consensus protocols, helps to address some security needs, but the consequences can be dire if security isn\'t fully explored.

The post Blockchain: Making the Reward Much Greater Than the Risk appeared first on Security Intelligence.

securityintelligence.png 2019-03-04 13:30:02 Are Your Employees Really Engaging With Security Awareness Training? (lien direct)

>Without security awareness training, security will not be front of mind for your end users - but that doesn\'t mean that companies with formal programs are effectively engaging their employees.

The post Are Your Employees Really Engaging With Security Awareness Training? appeared first on Security Intelligence.

securityintelligence.png 2019-03-04 11:00:02 Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems (lien direct)

>Two X-Force Red interns discovered 19 previously undisclosed vulnerabilities across five popular visitor management systems that could enable attackers to establish a foothold on corporate networks.

The post Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems appeared first on Security Intelligence.

securityintelligence.png 2019-03-01 13:00:02 Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics (lien direct)

>By following the example of industry leaders with mature security analytics capabilities, less advanced organizations can improve SOC visibility and shift from reactive to proactive threat detection.

The post Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics appeared first on Security Intelligence.

securityintelligence.png 2019-02-28 16:15:03 How Can CISOs Improve Board Governance Around Cyber Risk Management? (lien direct)

>While some organizations have improved their board governance processes on cybersecurity issues, much of the work to drive progress falls on the shoulders of the CISO.

The post How Can CISOs Improve Board Governance Around Cyber Risk Management? appeared first on Security Intelligence.

securityintelligence.png 2019-02-27 20:30:02 Recapping IBM Think 2019 and HIMSS19: The Shared Landscape of Global Security (lien direct)

>We\'re only a few months into the year, but HIMSS19 and Think 2019 have already helped shape this year\'s focus on enterprise transformation, innovation and global cybersecurity.

The post Recapping IBM Think 2019 and HIMSS19: The Shared Landscape of Global Security appeared first on Security Intelligence.

securityintelligence.png 2019-02-26 20:48:05 When Combating Emerging Social Media Attacks, Don\'t Try to Swim Against the Current (lien direct)

The lure of social media is too much to fight against. Instead of pushing back, we need to work with what we\'ve got and do our best to educate employees about potential social media attacks.

The post When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current appeared first on Security Intelligence.

securityintelligence.png 2019-02-26 20:46:02 RSA Conference 2019 Guide: Insider Tips From an RSAC 2018 Survivor (lien direct)

>Discover tips on how to survive RSA Conference 2019, based on first-hand knowledge from an RSAC 2018 survivor and can\'t-miss sessions from this year\'s show.

The post RSA Conference 2019 Guide: Insider Tips From an RSAC 2018 Survivor appeared first on Security Intelligence.

securityintelligence.png 2019-02-26 11:00:03 Cryptojacking Rises 450 Percent as Cybercriminals Pivot From Ransomware to Stealthier Attacks (lien direct)

>Cybercriminals made a lot of noise in 2017 with ransomware attacks like WannaCry and NotPetya, using an in-your-face approach to cyberattacks that netted them millions of dollars from victims. But new research from IBM X-Force, the threat intelligence, research and incident response arm of IBM Security, revealed that 2018 saw a rapid decline in ransomware […]

The post Cryptojacking Rises 450 Percent as Cybercriminals Pivot From Ransomware to Stealthier Attacks appeared first on Security Intelligence.

securityintelligence.png 2019-02-21 13:45:02 Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security (lien direct)

>While current email security solutions can help mitigate phishing impacts, companies must recognize the role of corporate email as a social network to address the human components of this risk.

The post Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security appeared first on Security Intelligence.

securityintelligence.png 2019-02-20 11:00:02 Calling Into Question the CVSS (lien direct)

>X-Force Red believes vulnerabilities should be ranked based on the importance of the exposed asset and whether the vulnerability is being weaponized by criminals, not necessarily its CVSS score.

The post Calling Into Question the CVSS appeared first on Security Intelligence.

securityintelligence.png 2019-02-19 12:45:03 Lessons from the Encryption Front Line: Core Components in the Cloud (lien direct)

>Depending on your needs, you can develop encryption solutions based on open standards from components you build and run yourself or source them as managed services from cloud providers.

The post Lessons from the Encryption Front Line: Core Components in the Cloud appeared first on Security Intelligence.

securityintelligence.png 2019-02-18 13:00:03 Global Cyber Intelligence Maven Limor Kessem Is a Guiding Light for Women in Security (lien direct)

>Limor Kessem studied microbiology in school and planned to open a naturopathy clinic. She\'s now one of IBM Security\'s top cyber intelligence experts and a dedicated role model for women in security.

The post Global Cyber Intelligence Maven Limor Kessem Is a Guiding Light for Women in Security appeared first on Security Intelligence.

securityintelligence.png 2019-02-18 11:00:04 Are Passwords Killing Your Customer Experience? Try Passwordless Authentication (lien direct)

>By implementing passwordless authentication, organizations can deliver the experience customers deserve and the security they demand.

The post Are Passwords Killing Your Customer Experience? Try Passwordless Authentication appeared first on Security Intelligence.

securityintelligence.png 2019-02-15 14:40:03 Are You Really Covered by Your Cyber Insurance? (lien direct)

>Statistically, you\'re probably not. Even those with cyber insurance often have policies that leave them exposed to certain types of breaches, regulatory fines and real-world financial losses.

The post Are You Really Covered by Your Cyber Insurance? appeared first on Security Intelligence.

securityintelligence.png 2019-02-14 15:25:02 Why You Need a Security-First Culture to Deliver on Your Customer-First Goals (lien direct)

>Organizations that do not establish a security-first culture will struggle to deliver on their customer-first initiatives.

The post Why You Need a Security-First Culture to Deliver on Your Customer-First Goals appeared first on Security Intelligence.

securityintelligence.png 2019-02-14 13:40:03 Take Your Relationship With DevSecOps to the Next Level (lien direct)

>Like any relationship, DevSecOps works best when there is a solid commitment, open communication and strong resolve in the face of challenges.

The post Take Your Relationship With DevSecOps to the Next Level appeared first on Security Intelligence.

securityintelligence.png 2019-02-14 12:35:03 Organizations Continue to Fail at IoT Security, and the Consequences Are Growing (lien direct)

>As the internet of things (IoT) takes over the world, IoT security remains, well, pitiful. Organizations are failing to ensure that the networks and data generated by IoT devices remain protected.

The post Organizations Continue to Fail at IoT Security, and the Consequences Are Growing appeared first on Security Intelligence.

securityintelligence.png 2019-02-13 20:30:04 Cybersecurity Leaders From Maersk and Westfield Insurance Discuss Digital Transformation at Major Industry Event (lien direct)

>IBM Security General Manager Mary O\'Brien sat down for a fireside chat with Kevin Baker, CISO of Westfield Insurance, and Maersk CISO Andy Powell about how digital transformation impacts security.

The post Cybersecurity Leaders From Maersk and Westfield Insurance Discuss Digital Transformation at Major Industry Event appeared first on Security Intelligence.

securityintelligence.png 2019-02-13 13:30:04 What Have We Learned About Data Protection After Another Year of Breaches? (lien direct)

>In 2018, data protection became top of mind for organizations around the world. What lessons can we draw from to help improve regulatory compliance, data breach protection and risk management in 2019?

The post What Have We Learned About Data Protection After Another Year of Breaches? appeared first on Security Intelligence.

securityintelligence.png 2019-02-12 13:35:03 Developing a Security Plan Around Consumer Data Privacy Concerns (lien direct)

>The onus to meet the challenge of consumers\' security and privacy expectations is on the enterprise. Developing a security plan around consumer concerns is a good first step.

The post Developing a Security Plan Around Consumer Data Privacy Concerns appeared first on Security Intelligence.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-03-26 04:01:32
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter