What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.png 2019-01-18 14:00:01 Succeed in Your Cloud Migration With a Secure Hybrid Cloud Strategy (lien direct)

>In the rush to digital transformation, treating cloud security services as an afterthought to hybrid cloud adoption is an increasingly risky mistake.

The post Succeed in Your Cloud Migration With a Secure Hybrid Cloud Strategy appeared first on Security Intelligence.

securityintelligence.png 2019-01-18 12:35:02 10 Cybersecurity Conference Trips You Should Make Time for This Year (lien direct)

>Not sure where to distribute IT budgets for ideal returns? Here\'s a roundup of the top 10 cybersecurity conference trips to make time for this year.

The post 10 Cybersecurity Conference Trips You Should Make Time for This Year appeared first on Security Intelligence.

securityintelligence.png 2019-01-17 14:15:02 Board Directors Can\'t Afford to Ignore Cybersecurity Risk (lien direct)

As businesses rush to adopt emerging technologies such as AI, blockchain and big data, board directors must increase their engagement around cybersecurity risk.

The post Board Directors Can’t Afford to Ignore Cybersecurity Risk appeared first on Security Intelligence.

securityintelligence.png 2019-01-17 13:05:01 Bring Order to Chaos By Building SIEM Use Cases, Standards, Baselining and Naming Conventions (lien direct)

>Standards, baselines and naming conventions can remove barriers to threat detection and response and help security teams build effective SIEM use cases.

The post Bring Order to Chaos By Building SIEM Use Cases, Standards, Baselining and Naming Conventions appeared first on Security Intelligence.

securityintelligence.png 2019-01-16 13:55:01 Stay Ahead of the Growing Security Analytics Market With These Best Practices (lien direct)

>Armed with security analytics tools, organizations can benefit from big data capabilities to analyze data and enhance detection with proactive alerts about potential malicious activity.

The post Stay Ahead of the Growing Security Analytics Market With These Best Practices appeared first on Security Intelligence.

securityintelligence.png 2019-01-16 08:55:04 The Success of Your Business Depends on Digital Trust. Here Is How to Measure It (lien direct)

>As consumers become more aware of their data privacy, organizations across sectors are under increasing pressure to deliver frinctionless digital trust.

The post The Success of Your Business Depends on Digital Trust. Here Is How to Measure It appeared first on Security Intelligence.

securityintelligence.png 2019-01-15 17:00:02 Where Can IT Get Expert Guidance for Managing Android in the Enterprise? (lien direct)

>IT decision-makers need to fast-track the EMM selection process to stay ahead of the evolving threat landscape and more effectively manage Android devices.

The post Where Can IT Get Expert Guidance for Managing Android in the Enterprise? appeared first on Security Intelligence.

securityintelligence.png 2019-01-15 12:55:01 The Success of Your Business Depends on Your Security Culture (lien direct)

>Given the historic data breaches, widespread vulnerabilities and onslaught of data privacy regulations that affected businesses around the world in 2018, security culture is more crucial than ever.

The post The Success of Your Business Depends on Your Security Culture appeared first on Security Intelligence.

securityintelligence.png 2019-01-15 11:00:02 How Secure Are Medical IoT Devices? Catherine Norcom Has Her Finger on the Pulse of the Industry (lien direct)

>We chatted with X-Force Red\'s resident hardware hacker, Catherine Norcom, about the FDA\'s recent guidance on securing medical IoT devices.

The post How Secure Are Medical IoT Devices? Catherine Norcom Has Her Finger on the Pulse of the Industry appeared first on Security Intelligence.

securityintelligence.png 2019-01-14 15:25:01 Need a Sounding Board for Your Incident Response Plan? Join a Security Community (lien direct)

>Joining a security community is a great way to get advice and feedback on your incident response plan from like-minded peers.

The post Need a Sounding Board for Your Incident Response Plan? Join a Security Community appeared first on Security Intelligence.

securityintelligence.png 2019-01-14 13:00:04 Protect Your Critical Assets in a Landscape of Expanding Attack Surfaces (lien direct)

>Security leaders face more challenges to protect critical assets than ever. The evolving enterprise landscape has created a need for new frameworks and solutions to achieve visibility and control.

The post Protect Your Critical Assets in a Landscape of Expanding Attack Surfaces appeared first on Security Intelligence.

securityintelligence.png 2019-01-14 12:50:02 When It Comes to Cyber Risks, A Confident Board Isn\'t Always a Good Thing (lien direct)

While board directors have been concerned with cybersecurity for some time, we\'re now seeing reports that they are improving their understanding of cyber risks and how those risks can impact business.

The post When It Comes to Cyber Risks, A Confident Board Isn’t Always a Good Thing appeared first on Security Intelligence.

securityintelligence.png 2019-01-11 12:35:02 Maturing Your Security Operations Center With the Art and Science of Threat Hunting (lien direct)

>By combining repeatable processes for threat hunting with intelligent solutions and skilled analysts, organizations can improve threat response and protect their most critical assets.

The post Maturing Your Security Operations Center With the Art and Science of Threat Hunting appeared first on Security Intelligence.

securityintelligence.png 2019-01-11 12:20:02 FBI Warns EdTech Needs Stronger Defenses for Students\' Personal Data (lien direct)

EdTech today stores more personally identifiable information on K-12 students than ever, but the FBI warns that much of that data is severely exposed to threat actors.

The post FBI Warns EdTech Needs Stronger Defenses for Students’ Personal Data appeared first on Security Intelligence.

securityintelligence.png 2019-01-10 14:30:02 How the Financial Services Industry Is Preparing to Avoid and Respond to Systemic Cyberattacks (lien direct)

>Financial services industry leaders visited the IBM X-Force Command Cyber Range for a war game exercise designed to battle-test their response to a systemic cyberattack.

The post How the Financial Services Industry Is Preparing to Avoid and Respond to Systemic Cyberattacks appeared first on Security Intelligence.

securityintelligence.png 2019-01-09 14:25:01 Deciphering the Encryption Paradox (lien direct)

>The practice of protecting network data with encryption is gaining steam, and with good reason. But companies need adequate network visibility to keep up with threats that evade traditional detection.

The post Deciphering the Encryption Paradox appeared first on Security Intelligence.

securityintelligence.png 2019-01-09 12:45:03 Maximize Your Security Operations Center Efficiency With Incident Response Orchestration (lien direct)

>Incident response orchestration and automation can help boost the accuracy and efficiency of IR processes and reduce the burden on the understaffed SOC.

The post Maximize Your Security Operations Center Efficiency With Incident Response Orchestration appeared first on Security Intelligence.

securityintelligence.png 2019-01-09 12:40:02 3 Urgent Areas of Action to Address National Cybersecurity Risks (lien direct)

>The U.S. is not where it needs to be in terms of managing cybersecurity risks as a national effort, according to the Aspen Cybersecurity Group.

The post 3 Urgent Areas of Action to Address National Cybersecurity Risks appeared first on Security Intelligence.

securityintelligence.png 2019-01-08 15:05:01 SIEM Event Normalization Makes Raw Data Relevant to Both Humans and Machines (lien direct)

>In its raw form, log data is almost impossible for a human to process, so advanced SIEM solutions conduct a process called event normalization to deliver a homogeneous view.

The post SIEM Event Normalization Makes Raw Data Relevant to Both Humans and Machines appeared first on Security Intelligence.

securityintelligence.png 2019-01-07 17:20:02 The System Development Life Cycle: A Phased Approach to Application Security (lien direct)

>By completing the phases of the system development life cycle (SDLC), security teams can integrate processes and technologies into the development process and improve application security.

The post The System Development Life Cycle: A Phased Approach to Application Security appeared first on Security Intelligence.

securityintelligence.png 2019-01-07 12:55:02 Is It Time for Enterprises to Bid Farewell to BYOD? (lien direct)

>As BYOD practices blur the boundary of the enterprise perimeter, how can security leaders ensure corporate data is safe?

The post Is It Time for Enterprises to Bid Farewell to BYOD? appeared first on Security Intelligence.

securityintelligence.png 2019-01-07 11:50:00 Close the Gap on Advanced Threats With Integrated Security (lien direct)

>Advanced threats are evolving faster than enterprise security, despite record spend. Organizations need an integrated ecosystem of solutions that provide visibility into anomalies and potential risks.

The post Close the Gap on Advanced Threats With Integrated Security appeared first on Security Intelligence.

securityintelligence.png 2019-01-04 13:05:02 New Year, New Risks: 3 Application Security Resolutions You Should Adopt in 2019 (lien direct)

>To ring in the new year, application security teams should resolve to implement more security into the development process, prioritize consumer trust and pay more attention to false negatives.

The post New Year, New Risks: 3 Application Security Resolutions You Should Adopt in 2019 appeared first on Security Intelligence.

securityintelligence.png 2019-01-04 12:30:03 Your Security Strategy Is Only as Strong as Your Cyber Hygiene (lien direct)

>Without full network visibility and regular utilization of cyber hygiene best practices, your enterprise could face very real, but entirely preventable, security risks.

The post Your Security Strategy Is Only as Strong as Your Cyber Hygiene appeared first on Security Intelligence.

securityintelligence.png 2019-01-03 13:25:02 The Gift That Keeps on Giving: PCI Compliance for Post-Holiday Season Returns (lien direct)

>Holiday spending is on the rise both in-store and online. How can retailers ensure PCI compliance to manage large transaction volumes and post-holiday refunds?

The post The Gift That Keeps on Giving: PCI Compliance for Post-Holiday Season Returns appeared first on Security Intelligence.

securityintelligence.png 2019-01-03 13:00:02 Government Cybersecurity Processes Must Change Drastically to Keep Up With Complex Attack Vectors (lien direct)

>Since governments have so many potential attack vectors to manage, government cybersecurity professionals need clear processes, procedures and authority to harden vulnerable environments.

The post Government Cybersecurity Processes Must Change Drastically to Keep Up With Complex Attack Vectors appeared first on Security Intelligence.

securityintelligence.png 2019-01-03 12:40:02 Who Goes There? The Art of Digital Identity and Access Management (lien direct)

>To connect the real world to the digital world, we can create digital identity models that represent a person with different attributes, characteristics and goals.

The post Who Goes There? The Art of Digital Identity and Access Management appeared first on Security Intelligence.

securityintelligence.png 2019-01-02 14:30:02 Why Proactive Data Compliance Is Imperative for Secure Digital Transformation (lien direct)

>The risks associated with failure to establish proactive data compliance go far beyond regulatory violations and loss of consumer trust. Compliance is critical for secure digital transformation.

The post Why Proactive Data Compliance Is Imperative for Secure Digital Transformation appeared first on Security Intelligence.

securityintelligence.png 2019-01-02 13:05:01 Top 2019 Cybersecurity Predictions From the Resilient Year-End Webinar (lien direct)

>During the recent IBM Resilient year-end webinar, expert panelists discussed and debated the trends that defined 2018 and offered cybersecurity predictions on what the industry can expect in 2019.

The post Top 2019 Cybersecurity Predictions From the Resilient Year-End Webinar appeared first on Security Intelligence.

securityintelligence.png 2019-01-02 12:45:02 It\'s Time to Dispel These Dangerous Password Security Myths (lien direct)

Passwords are bad, and alternatives abound. But first we need to overcome the common myths and misconceptions about the password.

The post It’s Time to Dispel These Dangerous Password Security Myths appeared first on Security Intelligence.

securityintelligence.png 2019-01-02 12:15:02 Lessons From the Data Encryption Front Line: Understanding Common Threats (lien direct)

>There is no single answer to the question of how to best use data encryption. Depending on their application and data types, organizations will likely need to apply different architectural patterns.

The post Lessons From the Data Encryption Front Line: Understanding Common Threats appeared first on Security Intelligence.

securityintelligence.png 2018-12-28 16:30:02 The Cyber Attribution Dilemma: 3 Barriers to Cyber Deterrence (lien direct)

>The concept of mutually assured destruction (MAD) has historically prevented nuclear war, but threat actors\' advanced obfuscation techniques have made cyber deterrence difficult if not impossible.

The post The Cyber Attribution Dilemma: 3 Barriers to Cyber Deterrence appeared first on Security Intelligence.

securityintelligence.png 2018-12-28 12:40:02 There Is No Perfect Time to Tackle Security Tasks, So Don\'t Wait Until It\'s Too Late (lien direct)

With so many fires to put out every day, it can be tempting to put off less urgent security tasks, exposing the enterprise to preventable risks.

The post There Is No Perfect Time to Tackle Security Tasks, So Don’t Wait Until It’s Too Late appeared first on Security Intelligence.

securityintelligence.png 2018-12-27 12:35:02 Is 5G Technology a Blessing or a Curse for Security? Depends Who You Ask (lien direct)

>With blazing fast speeds and lower latency, will 5G technology mitigate or exacerbate existing network security concerns?

The post Is 5G Technology a Blessing or a Curse for Security? Depends Who You Ask appeared first on Security Intelligence.

securityintelligence.png 2018-12-26 12:50:02 4 Ways to Overcome the Cyber Workforce Shortage (lien direct)

>The supply/demand ratio for the cyber workforce is now about 2.3 skilled workers per job opening, according to NIST. Security leaders need to be more creative to fill the gaps in their teams.

The post 4 Ways to Overcome the Cyber Workforce Shortage appeared first on Security Intelligence.

securityintelligence.png 2018-12-21 14:20:02 More Than Just a Fad: Lessons Learned About Threat Hunting in 2018 (lien direct)

>One cybersecurity capability that continues to prove it\'s here to stay is threat hunting, a proactive approach to discovering and mitigating threats.

The post More Than Just a Fad: Lessons Learned About Threat Hunting in 2018 appeared first on Security Intelligence.

securityintelligence.png 2018-12-21 12:10:02 How Allison Ritter Puts Security Lessons Into Action With Her Flare for Drama (lien direct)

>A love of the visual arts and a passion for drama brought Allison Ritter to the IBM X-Force Command Center. She channels these passions to create engaging, interactive security lessons for clients.

The post How Allison Ritter Puts Security Lessons Into Action With Her Flare for Drama appeared first on Security Intelligence.

securityintelligence.png 2018-12-20 13:00:02 IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape (lien direct)

>IBM X-Force\'s top security predictions for 2019 cover a range of potential attack schemes and consequences, from industry-specific prognostications to a rapid expansion of emerging criminal schemes.

The post IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape appeared first on Security Intelligence.

securityintelligence.png 2018-12-19 13:00:02 Cloud Security With a Chance of Data Breaches (lien direct)

>Companies should look for a cloud security solution that sits in front of the database and can send traffic to your existing tools without having to install any software on the database.

The post Cloud Security With a Chance of Data Breaches appeared first on Security Intelligence.

securityintelligence.png 2018-12-18 13:00:02 Machine Learning Will Transform How We Detect Software Vulnerabilities (lien direct)

>When used as part of the software development process, machine learning can help identify vulnerabilities before threat actors have a chance to exploit them.

The post Machine Learning Will Transform How We Detect Software Vulnerabilities appeared first on Security Intelligence.

securityintelligence.png 2018-12-18 11:55:01 From Naughty to NICE: Best Practices for K–12 Cybersecurity Education (lien direct)

>The National Institute for Cybersecurity Education is leading the charge in K–12 security awareness training.

The post From Naughty to NICE: Best Practices for K–12 Cybersecurity Education appeared first on Security Intelligence.

securityintelligence.png 2018-12-17 16:45:02 Is It Time to Start a PSIRT? Why Your CSIRT May Not Be Enough (lien direct)

>Your CSIRT protects your organizational network, but who secures your products? It may be time you started a PSIRT at your company.

The post Is It Time to Start a PSIRT? Why Your CSIRT May Not Be Enough appeared first on Security Intelligence.

securityintelligence.png 2018-12-17 12:15:02 How I Hacked My Connected Car, and Other Thoughts on Vehicle Cybersecurity (lien direct)

>Even if you\'re not into car hacks, you should still learn about the future of vehicle cybersecurity and the challenge it represents. But if you are, read on to learn how I hacked my connected car.

The post How I Hacked My Connected Car, and Other Thoughts on Vehicle Cybersecurity appeared first on Security Intelligence.

securityintelligence.png 2018-12-17 11:40:01 How to Check for Blind Spots in Your Security Program (lien direct)

>An effective security program does more than merely take on the appearance of cyber resilience. Learn how to look behind the curtain of your enterprise security.

The post How to Check for Blind Spots in Your Security Program appeared first on Security Intelligence.

securityintelligence.png 2018-12-14 14:15:02 How Alex Rombak Uses His Hospitality Background to Provide Top Tier Technical Support (lien direct)

>Alex Rombak has heard your jokes about tech support, and he doesn\'t mind. He knows the important role he plays in supply chain security, supporting financial institutions when things go wrong.

The post How Alex Rombak Uses His Hospitality Background to Provide Top Tier Technical Support appeared first on Security Intelligence.

securityintelligence.png 2018-12-14 12:50:01 3 Keys to Building a Scalable Incident Response Automation and Orchestration Plan (lien direct)

>A robust, documented incident response plan is the foundation of a successful automation and orchestration program - but where do you begin?

The post 3 Keys to Building a Scalable Incident Response Automation and Orchestration Plan appeared first on Security Intelligence.

securityintelligence.png 2018-12-14 12:20:02 Stay on Top of Zero-Day Malware Attacks With Smart Mobile Threat Defense (lien direct)

>Mobile threats are growing both in number and severity. To protect crucial data, organizations need mobile threat defense solutions that can replicate the accuracy of manual analysis on a large scale.

The post Stay on Top of Zero-Day Malware Attacks With Smart Mobile Threat Defense appeared first on Security Intelligence.

securityintelligence.png 2018-12-13 13:05:01 Overcoming the Cloud Security Compliance Conundrum (lien direct)

>Compliance with various regulations and cloud security requirements has expanded as technology and cloud uptake advance, leaving organizations with a challenging conundrum to solve.

The post Overcoming the Cloud Security Compliance Conundrum appeared first on Security Intelligence.

securityintelligence.png 2018-12-12 16:45:02 3 Security Business Benefits From a 2018 Gartner Magic Quadrant SIEM Leader (lien direct)

>The main characteristics of a SIEM leader are centered around innovation in early threat detection, adaptation to customer environments and strong market presence.

The post 3 Security Business Benefits From a 2018 Gartner Magic Quadrant SIEM Leader appeared first on Security Intelligence.

securityintelligence.png 2018-12-12 12:15:02 Continuous Compliance Eases Cloud Adoption for Financial Services Firms (lien direct)

>Financial services firms face three challenges when adopting the hybrid cloud: continuous compliance with geography-specific regulations, inconsistent controls and lack of a common security framework.

The post Continuous Compliance Eases Cloud Adoption for Financial Services Firms appeared first on Security Intelligence.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-01-19 06:03:28
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter