What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.png 2019-09-20 14:30:25 How to Take Control of Your Privileged Accounts (lien direct)

Privileged access management is a top concern for CISOs. Learn how to discover your organization\'s privileged accounts, why you need a least privilege strategy and how to reduce risky applications.

The post How to Take Control of Your Privileged Accounts appeared first on Security Intelligence.

securityintelligence.png 2019-09-19 14:15:24 Night Vision: Navigating the Darknet for Improved Threat Intelligence (lien direct)

Reading Time: 4 minutes Securely accessing the darknet can help organizations overhear criminal conversations, find actionable data, look for evidence of compromise, build better defenses and uncover critical user risks.

The post Night Vision: Navigating the Darknet for Improved Threat Intelligence appeared first on Security Intelligence.

Threat
securityintelligence.png 2019-09-19 14:00:34 Speak Up! How a Graduate Security Architect Learned to Challenge the Status Quo (lien direct)

Reading Time: 5 minutes One of the hardest - and most rewarding - lessons I learned during my first bid as a graduate security architect was to back my suggestions with confidence, but know when to back off.

The post Speak Up! How a Graduate Security Architect Learned to Challenge the Status Quo appeared first on Security Intelligence.

securityintelligence.png 2019-09-18 13:30:30 How Data Loss Prevention (DLP) Can Help Solve the Insider Threat Problem (lien direct)

Reading Time: 3 minutes A data loss prevention (DLP) solution that delivers comprehensive visibility, historical context and file recovery can help organizations meet the challenges posed by insider threats.

The post How Data Loss Prevention (DLP) Can Help Solve the Insider Threat Problem appeared first on Security Intelligence.

Threat
securityintelligence.png 2019-09-18 11:00:25 The Future of Cybercrime: Where Are We Headed? (lien direct)

Reading Time: 3 minutes By 2024, the collective cost of data breaches will reach $5 trillion, according to a study by Juniper Research. This is just one indication of how the future of cybercrime will impact us.

The post The Future of Cybercrime: Where Are We Headed? appeared first on Security Intelligence.

securityintelligence.png 2019-09-17 15:55:21 Mobile Device Disposal: Best Practices for Burying BYOD Endpoints Without Risk (lien direct)

Reading Time: 4 minutes Traditional end-of-life procedures for corporate mobile devices can\'t scale to BYOD. Learn how to avoid the risks that can occur during personal device disposal.

The post Mobile Device Disposal: Best Practices for Burying BYOD Endpoints Without Risk appeared first on Security Intelligence.

securityintelligence.png 2019-09-16 10:45:23 Your Users Aren\'t the Weakest Link - They\'re Integral to Your Security Program (lien direct)

Reading Time: 4 minutes When implemented correctly, zero trust can improve a company\'s resilience to recover after a breach. But when you don\'t trust users to make good decisions and act accordingly, the system falls apart.

The post Your Users Aren’t the Weakest Link - They’re Integral to Your Security Program appeared first on Security Intelligence.

securityintelligence.png 2019-09-13 10:30:02 How to Select the Right IDaaS Vendor and Avoid Deployment Pain Points (lien direct)

>Reading Time: 4 minutes Companies of all sizes are turning to IDaaS vendors to help them protect systems, applications, identities and data wherever they reside - whether in the cloud, on-premises or on mobile devices.

The post How to Select the Right IDaaS Vendor and Avoid Deployment Pain Points appeared first on Security Intelligence.

securityintelligence.png 2019-09-12 11:00:02 The Art of Patch Management (lien direct)

>Reading Time: 4 minutes The vagaries of systems and organizations, compounded by the irrationality of the human mind and variations in patches themselves, means that patch management is not an exact science - it\'s an art.

The post The Art of Patch Management appeared first on Security Intelligence.

securityintelligence.png 2019-09-12 10:45:02 5 Things You Can Do After a Data Breach to Help Mitigate Cost (lien direct)

>Reading Time: 5 minutes The cost of a data breach is rising, and a carefully planned and regularly rehearsed response can go a long way toward saving your company money in the wake of a security incident.

The post 5 Things You Can Do After a Data Breach to Help Mitigate Cost appeared first on Security Intelligence.

Data Breach
securityintelligence.png 2019-09-12 10:35:02 How Will Strong Customer Authentication Impact the Security of Electronic Payments? (lien direct)

>Reading Time: 3 minutes The EU\'s updated Payment Services Directive, PSD2, will introduce a new technical standard that regulates strong customer authentication (SCA).

The post How Will Strong Customer Authentication Impact the Security of Electronic Payments? appeared first on Security Intelligence.

securityintelligence.png 2019-09-12 10:00:03 New Poll Shows Consumers\' Expectations on Data Privacy Evolve, But So Does Technology (lien direct)

Reading Time: 5 minutes Consumers\' understanding of data privacy is evolving. Nearly two-thirds of poll respondents strongly agree that companies should be doing more to protect them against cybersecurity threats.

The post New Poll Shows Consumers’ Expectations on Data Privacy Evolve, But So Does Technology appeared first on Security Intelligence.

securityintelligence.png 2019-09-11 11:00:02 10 Reasons Cyber Range Simulation Is Vital to Incident Response (lien direct)

>Reading Time: 4 minutes Is your incident response plan resilient when you\'re under attack? Simulation in the cyber range can allow you to test how well you perform when it matters.

The post 10 Reasons Cyber Range Simulation Is Vital to Incident Response appeared first on Security Intelligence.

securityintelligence.png 2019-09-10 11:20:02 10 Surprisingly Bright Spots on the Darknet (lien direct)

>Reading Time: 4 minutes The darknet isn\'t all creepy, illegal content. In between criminal marketplaces and hacker forums, there\'s a few hidden websites that exist for legitimate purposes.

The post 10 Surprisingly Bright Spots on the Darknet appeared first on Security Intelligence.

securityintelligence.png 2019-09-09 11:00:02 5 Key Steps to Developing Your Global Data Privacy Program (lien direct)

>Reading Time: 7 minutes If your organization does business with customers in multiple regions and thus must comply with multiple data privacy regulations, it helps to address them as a single, combined initiative.

The post 5 Key Steps to Developing Your Global Data Privacy Program appeared first on Security Intelligence.

securityintelligence.png 2019-09-06 14:05:02 3 Reasons Why Traditional Managed Security Services (MSS) Is Out (lien direct)

>Reading Time: 4 minutes The market for managed security services (MSS) is transitioning from traditional monitoring and management to sophisticated security services driven by AI and human intelligence.

The post 3 Reasons Why Traditional Managed Security Services (MSS) Is Out appeared first on Security Intelligence.

securityintelligence.png 2019-09-06 14:00:02 What Does Good Cyber Resilience Look Like in 2019? (lien direct)

>Reading Time: 4 minutes As cyber risks increase, cyber resilience in 2019 requires the establishment of measurable baselines and the implementation of tools, such as the NIST Cybersecurity Framework, to minimize risk.

The post What Does Good Cyber Resilience Look Like in 2019? appeared first on Security Intelligence.

securityintelligence.png 2019-09-05 11:00:02 How Can Financial Services Stem the Tide of Mobile Phishing Attacks? (lien direct)

>Reading Time: 4 minutes What can financial services organizations do to protect their highly sensitive information from mobile phishing attacks?

The post How Can Financial Services Stem the Tide of Mobile Phishing Attacks? appeared first on Security Intelligence.

securityintelligence.png 2019-09-04 14:30:03 Why Fraudsters Are Flying High on Airline Loyalty Programs (lien direct)

>Reading Time: 6 minutes While the value of airline loyalty programs and the customers they serve is well-established, protecting these assets with security controls needs to be more than an afterthought.

The post Why Fraudsters Are Flying High on Airline Loyalty Programs appeared first on Security Intelligence.

securityintelligence.png 2019-09-04 11:30:02 Making the Case for Network Segmentation in AWS (lien direct)

>Reading Time: 4 minutes Network segmentation, a concept that dates back to the start of enterprise IT systems, is now a routine part of building data centers and application architectures.

The post Making the Case for Network Segmentation in AWS appeared first on Security Intelligence.

securityintelligence.png 2019-09-04 10:30:02 Is Personality the Missing Piece of Security Awareness Training? (lien direct)

>Reading Time: 3 minutes What if we have been approaching security awareness training all wrong? One way to start individualizing security education is by recognizing and working with personality types.

The post Is Personality the Missing Piece of Security Awareness Training? appeared first on Security Intelligence.

securityintelligence.png 2019-09-03 12:15:02 Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade (lien direct)

>Reading Time: 4 minutes Today, the body broker business is unregulated as in centuries past. Security tools such as RFID tracking, blockchain transactions and IAM can help validate the trustworthiness of buyers and sellers.

The post Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade appeared first on Security Intelligence.

securityintelligence.png 2019-08-30 11:45:02 How to Know if Your Cybersecurity Tools Are Actually Working (lien direct)

>Reading Time: 3 minutes It\'s time to turn that nagging feeling of uncertainty about the efficacy of your cybersecurity tools into an action plan for gaining the visibility you need.

The post How to Know if Your Cybersecurity Tools Are Actually Working appeared first on Security Intelligence.

securityintelligence.png 2019-08-30 11:00:03 What Is Conditional Access, and Why Does It Matter to You? (lien direct)

>Reading Time: 3 minutes The shift to mobile and cloud has driven the rise of conditional access, which enables IT security teams to validate devices and users with a set of automated policies to protect networks and data.

The post What Is Conditional Access, and Why Does It Matter to You? appeared first on Security Intelligence.

securityintelligence.png 2019-08-30 11:00:02 How to Get Business Users to Buy Into Your Identity and Access Management (IAM) Strategy (lien direct)

>Reading Time: 3 minutes Organizations that fail to communicate identity and access management (IAM) processes in relevant business terms often struggle to gain user buy-in.

The post How to Get Business Users to Buy Into Your Identity and Access Management (IAM) Strategy appeared first on Security Intelligence.

securityintelligence.png 2019-08-29 10:01:00 Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention (lien direct)

>Reading Time: 4 minutes If CISOs could make one cybersecurity issue vanish, malware would top the list. While there\'s no silver-bullet solutions, the world of magic offers insights for effective malware prevention.

The post Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention appeared first on Security Intelligence.

Malware
securityintelligence.png 2019-08-29 10:00:05 More_eggs, Anyone? Threat Actor ITG08 Strikes Again (lien direct)

>Reading Time: 14 minutes X-Force IRIS observed ITG08, which has historically targeted POS machines in the retail and hospitality sectors, injecting malicious code into online checkout pages to steal payment card data.

The post More_eggs, Anyone? Threat Actor ITG08 Strikes Again appeared first on Security Intelligence.

Threat
securityintelligence.png 2019-08-28 12:00:02 The Business Case for Privileged Access Management (PAM) Goes Beyond Security and Compliance (lien direct)

>Reading Time: 6 minutes Privileged access management is often seen as a necessary evil to improve security and compliance. However, PAM solutions offer myriad benefits that can help prove security ROI to business leaders.

The post The Business Case for Privileged Access Management (PAM) Goes Beyond Security and Compliance appeared first on Security Intelligence.

securityintelligence.png 2019-08-28 11:30:02 Considering Container Security? 6 Ways to Make a Case for Containerization (lien direct)

>Reading Time: 5 minutes Containerization can create a pathway to secure digital transformation. Discover how to make a business case for container security.

The post Considering Container Security? 6 Ways to Make a Case for Containerization appeared first on Security Intelligence.

securityintelligence.png 2019-08-28 11:00:02 What Are Advanced Persistent Threats (APTs), and How Do You Find Them? (lien direct)

>Reading Time: 4 minutes Companies are constrained by insufficient time and resources to detect and respond to advanced persistent threats (APTs). How can SOCs fill the gaps and keep advanced attackers out of their networks?

The post What Are Advanced Persistent Threats (APTs), and How Do You Find Them? appeared first on Security Intelligence.

securityintelligence.png 2019-08-27 11:00:03 M&A Security Considerations and the Importance of Due Diligence (lien direct)

Reading Time: 4 minutes Organizations that fail to assess the risk posture of an acquisition target in accordance with M&A security best practices could expose themselves to data breaches, IoT security threats and more.

The post M&A Security Considerations and the Importance of Due Diligence appeared first on Security Intelligence.

securityintelligence.png 2019-08-27 11:00:02 The Many Roles of the CISO as Viewed as \'Star Trek\' Characters (lien direct)

Reading Time: 5 minutes The array of characters in the Star Trek world mimics the multifaceted role of today\'s chief information security officer (CISO).

The post The Many Roles of the CISO as Viewed as ‘Star Trek’ Characters appeared first on Security Intelligence.

securityintelligence.png 2019-08-26 13:00:02 What Is SIEM and How Does It Enhance Threat Detection? (lien direct)

>Reading Time: 3 minutes What is SIEM? Security information and event management helps organizations detect threats via fine-grained, real-time visibility into on-premises and cloud-based activity.

The post What Is SIEM and How Does It Enhance Threat Detection? appeared first on Security Intelligence.

Threat
securityintelligence.png 2019-08-26 11:30:02 What\'s New With Q? A Guide to the Next Stage of Android (lien direct)

Reading Time: 4 minutes From consumer privacy to enterprise scalability, the Android Q platform is undergoing major developments.

The post What’s New With Q? A Guide to the Next Stage of Android appeared first on Security Intelligence.

securityintelligence.png 2019-08-23 13:25:04 Can Fraud Detection Solutions Deliver the Authentication, Risk and Compliance Tools Banks and Insurers Need? (lien direct)

>Reading Time: 6 minutes Instead of just throwing money at increasingly complex security issues, organizations should embrace fraud detection and user authentication tools that flex to match risk appetite and business goals.

The post Can Fraud Detection Solutions Deliver the Authentication, Risk and Compliance Tools Banks and Insurers Need? appeared first on Security Intelligence.

securityintelligence.png 2019-08-23 13:25:02 4 Reasons to Consider a Security Marketing Internship (lien direct)

>Reading Time: 3 minutes If you\'re wired to innovate and eager to make the world a better, safer place alongside some of cybersecurity\'s greatest minds, a security marketing internship may be right for you.

The post 4 Reasons to Consider a Security Marketing Internship appeared first on Security Intelligence.

securityintelligence.png 2019-08-23 10:45:02 Why Deepfake Audio Technology Is a Real Threat to Enterprise Security (lien direct)

>Reading Time: 3 minutes Deepfake audio technology has already begun wreaking havoc on the business world. Is your enterprise prepared for this next-generation threat?

The post Why Deepfake Audio Technology Is a Real Threat to Enterprise Security appeared first on Security Intelligence.

Threat
securityintelligence.png 2019-08-22 11:30:02 Digital Identity Trust Life Cycle: Implementing Your Fraud Protection Solution (lien direct)

>Reading Time: 3 minutes Going live with your fraud protection solution should be a strategic process that enables smooth transitions and positive outcomes.

The post Digital Identity Trust Life Cycle: Implementing Your Fraud Protection Solution appeared first on Security Intelligence.

securityintelligence.png 2019-08-21 12:40:02 Securing the Industrial Internet of Things in the Utilities Sector (lien direct)

>Reading Time: 4 minutes While the industrial internet of things has clear benefits, IIoT environments also have the potential to expose high-value assets or services to a larger attack surface.

The post Securing the Industrial Internet of Things in the Utilities Sector appeared first on Security Intelligence.

securityintelligence.png 2019-08-20 17:15:02 KuppingerCole Analysts Zoom Out in New Report to Capture IT Landscape\'s Complexity (lien direct)

Reading Time: 3 minutes The IT landscape is becoming more complex every day. To manage this complexity, companies need integrated, best-of-breed data protection solutions that secure both structured and unstructured data.

The post KuppingerCole Analysts Zoom Out in New Report to Capture IT Landscape’s Complexity appeared first on Security Intelligence.

securityintelligence.png 2019-08-19 10:30:03 How Video Became a Dangerous Delivery Vehicle for Malware Attacks (lien direct)

>Reading Time: 4 minutes The lure of video might be the perfect social engineering trick for malware attacks. Here\'s how your enterprise security team can fight back.

The post How Video Became a Dangerous Delivery Vehicle for Malware Attacks appeared first on Security Intelligence.

Malware
securityintelligence.png 2019-08-19 10:30:02 (Déjà vu) Context Becomes Key: The \'2019 Gartner Magic Quadrant for Access Management\' (lien direct)

Reading Time: 4 minutes IBM was named a Leader in the "2019 Gartner Magic Quadrant for Access Management" for its ability to execute and completeness of vision.

The post Context Becomes Key: The ‘2019 Gartner Magic Quadrant for Access Management’ appeared first on Security Intelligence.

securityintelligence.png 2019-08-16 11:30:02 7 Can\'t-Miss Cybersecurity Lessons From Black Hat USA and Vegas Security Week (lien direct)

Reading Time: 5 minutes Black Hat USA and DEF CON revealed some shocking developments in IoT and biometric security, providing important cybersecurity lessons for enterprise security professionals.

The post 7 Can’t-Miss Cybersecurity Lessons From Black Hat USA and Vegas Security Week appeared first on Security Intelligence.

securityintelligence.png 2019-08-15 13:00:03 Advance Your Red Hat Development With Cybersecurity (lien direct)

>Reading Time: 3 minutes By applying its user-driven innovation approach to cloud development technologies, Red Hat has made open-source cloud application development ultra-usable and even more secure.

The post Advance Your Red Hat Development With Cybersecurity appeared first on Security Intelligence.

securityintelligence.png 2019-08-15 11:00:02 3 Barriers to Identity and Access Management (IAM) Modernization (lien direct)

>Reading Time: 3 minutes Organizations of all sizes are struggling to modernize their identity and access management programs due to incomplete IAM strategies, poor alignment with the business, legacy systems and more.

The post 3 Barriers to Identity and Access Management (IAM) Modernization appeared first on Security Intelligence.

securityintelligence.png 2019-08-14 11:45:02 3 Ways to Adopt Zero Trust Security Without Rebuilding Your Network (lien direct)

>Reading Time: 3 minutes Network vulnerabilities can be found in the most unlikely places. That\'s why companies should adopt zero trust security principles, even if they lack the resources to rebuild the network from scratch.

The post 3 Ways to Adopt Zero Trust Security Without Rebuilding Your Network appeared first on Security Intelligence.

securityintelligence.png 2019-08-14 11:30:02 Is Staff Burnout the Best Reason to Implement Cybersecurity AI? (lien direct)

>Reading Time: 4 minutes Staff burnout in the cybersecurity industry is at worrisome levels. With more data production and next-generation technology around the corner, now may be the best time to implement cybersecurity AI.

The post Is Staff Burnout the Best Reason to Implement Cybersecurity AI? appeared first on Security Intelligence.

securityintelligence.png 2019-08-13 13:00:03 (Déjà vu) UEM\'s Sophomore Year: \'2019 Gartner Magic Quadrant for Unified Endpoint Management Tools\' (lien direct)

Reading Time: 4 minutes IBM was named a Leader in the "2019 Gartner Magic Quadrant for Unified Endpoint Management" for its ability to execute and lead the entire field of vendors in its completeness of vision.

The post UEM’s Sophomore Year: ‘2019 Gartner Magic Quadrant for Unified Endpoint Management Tools’ appeared first on Security Intelligence.

securityintelligence.png 2019-08-13 11:00:02 Bypass the Cost of Ownership With Security-as-a-Service (SECaaS) (lien direct)

>Reading Time: 3 minutes For organizations looking to maximize their security budget, security-as-a-service (SECaaS) solutions offer a way to achieve security outcomes without paying the cost of ownership.

The post Bypass the Cost of Ownership With Security-as-a-Service (SECaaS) appeared first on Security Intelligence.

securityintelligence.png 2019-08-12 12:10:02 5G Technology Is Coming, But Is It Already Filled With Security Flaws? (lien direct)

>Reading Time: 3 minutes There is a lot to be excited about with 5G technology, but it will also open more doors for threat actors to get into networks, making it more difficult to effectively protect endpoints and data.

The post 5G Technology Is Coming, But Is It Already Filled With Security Flaws? appeared first on Security Intelligence.

Threat
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-09-22 08:07:45
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter