What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2019-03-14 16:25:01 Breaking Down the Incident Notification Requirements in the EU\'s NIS Directive (lien direct) Similar to the GDPR, you can approach the NIS Directive as a roadblock or a nuisance, or you can consider it an excellent opportunity to improve your security posture.
securityintelligence.webp 2019-03-13 16:10:02 With AI for Cybersecurity, We Are Raising the Bar for Smart (lien direct) >It's hard to believe a computer that couldn't read a newspaper was once considered smart. But as recent innovations in AI for cybersecurity have shown, we are constantly raising the bar for smart.
securityintelligence.webp 2019-03-13 12:20:02 How CISOs Can Facilitate the Advent of the Cognitive Enterprise (lien direct) >Just as organizations get comfortable with leveraging the cloud, another wave of digital disruption is on the horizon: artificial intelligence and its ability to drive the cognitive enterprise.
securityintelligence.webp 2019-03-12 13:30:02 Spectre, Meltdown and More: What You Need to Know About Hardware Vulnerabilities (lien direct) >According to IBM X-Force IRIS research, threat actors will continue to search for ways to leverage Spectre, Meltdown and other hardware vulnerabilities to steal data in the coming years. Threat
securityintelligence.webp 2019-03-12 12:00:02 An Apple a Day Won\'t Improve Your Security Hygiene, But a Cyber Doctor Might (lien direct) Internal assessments and audits are necessary, but they have their limitations. Some outside assistance could help improve your security hygiene and inoculate you from the nastiest of cyber bugs.
securityintelligence.webp 2019-03-11 12:00:02 Security Considerations for Whatever Cloud Service Model You Adopt (lien direct) >Regardless of what cloud service model you adopt, it's important to consider security implications related to application development, data and contract management, and IT asset governance.
securityintelligence.webp 2019-03-08 20:40:02 Women in Security Speak Out at RSAC 2019, But There\'s Still a Long Way to Go (lien direct) At RSAC 2019, IBM Security General Manager Mary O'Brien noted that while the industry has made progress toward improving the experience of women in security, "a little better isn't going to cut it."
securityintelligence.webp 2019-03-08 17:55:02 At RSAC 2019, It\'s Clear the World Needs More Public Interest Technologists (lien direct) In a world where technology and culture are one and the same, public-interest technologists are critical to a better future.
securityintelligence.webp 2019-03-08 13:30:05 Celebrating International Women\'s Day: Why We Need Better Representation of Women in Security (lien direct) This International Women's Day, we celebrate the accomplishments of some of the most influential women in security and explore ways to expose more girls and young women to cyber careers.
securityintelligence.webp 2019-03-07 13:05:02 Comprehensive Vulnerability Management in Connected Security Solutions (lien direct) >To stay ahead of attackers, organizations should consider vulnerability management solutions that integrate with SIEM tools, network and threat modeling capabilities, and patch management systems. Vulnerability Threat
securityintelligence.webp 2019-03-07 13:00:02 It\'s Time for an Automotive Cybersecurity Wake-Up Call (lien direct) The car of today - and especially tomorrow - relies on countless lines of software code to get those wheels moving, a reality that has placed increasing importance on automotive cybersecurity.
securityintelligence.webp 2019-03-06 13:00:02 Don\'t Believe Your Eyes: Deepfake Videos Are Coming to Fool Us All (lien direct) Deepfake videos that are indistinguishable from authentic videos are coming, and we can scarcely imagine what they'll be used for. We should start preparing for the worst.
securityintelligence.webp 2019-03-05 14:15:02 Spring Cleaning for CISOs: Replace These 3 Bad Habits With Better Cybersecurity Practices (lien direct) >Spring is just around the corner, which means it's time for CISOs to evaluate their security strategy, eliminate processes that aren't working, and adopt new cybersecurity practices and technologies.
securityintelligence.webp 2019-03-05 14:00:02 How to Accelerate Your Cloud IAM Adoption (lien direct) >Moving identity management processes to cloud IAM services introduces benefits such as cost-efficiency, flexibility, faster deployments and simplified operations.
securityintelligence.webp 2019-03-05 11:00:02 Blockchain: Making the Reward Much Greater Than the Risk (lien direct) >The decentralized nature of blockchain, coupled with consensus protocols, helps to address some security needs, but the consequences can be dire if security isn't fully explored.
securityintelligence.webp 2019-03-04 13:30:02 Are Your Employees Really Engaging With Security Awareness Training? (lien direct) >Without security awareness training, security will not be front of mind for your end users - but that doesn't mean that companies with formal programs are effectively engaging their employees.
securityintelligence.webp 2019-03-04 11:00:02 Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems (lien direct) >Two X-Force Red interns discovered 19 previously undisclosed vulnerabilities across five popular visitor management systems that could enable attackers to establish a foothold on corporate networks.
securityintelligence.webp 2019-03-01 13:00:02 Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics (lien direct) >By following the example of industry leaders with mature security analytics capabilities, less advanced organizations can improve SOC visibility and shift from reactive to proactive threat detection. Threat Guideline
securityintelligence.webp 2019-02-28 16:15:03 How Can CISOs Improve Board Governance Around Cyber Risk Management? (lien direct) >While some organizations have improved their board governance processes on cybersecurity issues, much of the work to drive progress falls on the shoulders of the CISO.
securityintelligence.webp 2019-02-27 20:30:02 Recapping IBM Think 2019 and HIMSS19: The Shared Landscape of Global Security (lien direct) >We're only a few months into the year, but HIMSS19 and Think 2019 have already helped shape this year's focus on enterprise transformation, innovation and global cybersecurity.
securityintelligence.webp 2019-02-26 20:48:05 When Combating Emerging Social Media Attacks, Don\'t Try to Swim Against the Current (lien direct) The lure of social media is too much to fight against. Instead of pushing back, we need to work with what we've got and do our best to educate employees about potential social media attacks.
securityintelligence.webp 2019-02-26 20:46:02 RSA Conference 2019 Guide: Insider Tips From an RSAC 2018 Survivor (lien direct) >Discover tips on how to survive RSA Conference 2019, based on first-hand knowledge from an RSAC 2018 survivor and can't-miss sessions from this year's show.
securityintelligence.webp 2019-02-26 11:00:03 Cryptojacking Rises 450 Percent as Cybercriminals Pivot From Ransomware to Stealthier Attacks (lien direct) >Cybercriminals made a lot of noise in 2017 with ransomware attacks like WannaCry and NotPetya, using an in-your-face approach to cyberattacks that netted them millions of dollars from victims. But new research from IBM X-Force, the threat intelligence, research and incident response arm of IBM Security, revealed that 2018 saw a rapid decline in ransomware […] Ransomware Threat NotPetya Wannacry ★★
securityintelligence.webp 2019-02-21 13:45:02 Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security (lien direct) >While current email security solutions can help mitigate phishing impacts, companies must recognize the role of corporate email as a social network to address the human components of this risk.
securityintelligence.webp 2019-02-20 11:00:02 Calling Into Question the CVSS (lien direct) >X-Force Red believes vulnerabilities should be ranked based on the importance of the exposed asset and whether the vulnerability is being weaponized by criminals, not necessarily its CVSS score. Vulnerability
securityintelligence.webp 2019-02-19 12:45:03 Lessons from the Encryption Front Line: Core Components in the Cloud (lien direct) >Depending on your needs, you can develop encryption solutions based on open standards from components you build and run yourself or source them as managed services from cloud providers.
securityintelligence.webp 2019-02-18 13:00:03 Global Cyber Intelligence Maven Limor Kessem Is a Guiding Light for Women in Security (lien direct) >Limor Kessem studied microbiology in school and planned to open a naturopathy clinic. She's now one of IBM Security's top cyber intelligence experts and a dedicated role model for women in security.
securityintelligence.webp 2019-02-18 11:00:04 Are Passwords Killing Your Customer Experience? Try Passwordless Authentication (lien direct) >By implementing passwordless authentication, organizations can deliver the experience customers deserve and the security they demand.
securityintelligence.webp 2019-02-15 14:40:03 Are You Really Covered by Your Cyber Insurance? (lien direct) >Statistically, you're probably not. Even those with cyber insurance often have policies that leave them exposed to certain types of breaches, regulatory fines and real-world financial losses.
securityintelligence.webp 2019-02-14 15:25:02 Why You Need a Security-First Culture to Deliver on Your Customer-First Goals (lien direct) >Organizations that do not establish a security-first culture will struggle to deliver on their customer-first initiatives.
securityintelligence.webp 2019-02-14 13:40:03 Take Your Relationship With DevSecOps to the Next Level (lien direct) >Like any relationship, DevSecOps works best when there is a solid commitment, open communication and strong resolve in the face of challenges.
securityintelligence.webp 2019-02-14 12:35:03 Organizations Continue to Fail at IoT Security, and the Consequences Are Growing (lien direct) >As the internet of things (IoT) takes over the world, IoT security remains, well, pitiful. Organizations are failing to ensure that the networks and data generated by IoT devices remain protected.
securityintelligence.webp 2019-02-13 20:30:04 Cybersecurity Leaders From Maersk and Westfield Insurance Discuss Digital Transformation at Major Industry Event (lien direct) >IBM Security General Manager Mary O'Brien sat down for a fireside chat with Kevin Baker, CISO of Westfield Insurance, and Maersk CISO Andy Powell about how digital transformation impacts security.
securityintelligence.webp 2019-02-13 13:30:04 What Have We Learned About Data Protection After Another Year of Breaches? (lien direct) >In 2018, data protection became top of mind for organizations around the world. What lessons can we draw from to help improve regulatory compliance, data breach protection and risk management in 2019? Data Breach
securityintelligence.webp 2019-02-12 13:35:03 Developing a Security Plan Around Consumer Data Privacy Concerns (lien direct) >The onus to meet the challenge of consumers' security and privacy expectations is on the enterprise. Developing a security plan around consumer concerns is a good first step.
securityintelligence.webp 2019-02-12 13:30:04 Are Applications of AI in Cybersecurity Delivering What They Promised? (lien direct) >Many enterprises are utilizing artificial intelligence (AI) technologies as part of their overall security strategy, but results are mixed on the usefulness of AI in cybersecurity settings.
securityintelligence.webp 2019-02-11 12:10:03 How Nat Prakongpan Found His Home on the Cyber Range (lien direct) >Nat Prakongpan was building enterprise networks for his school in Thailand in the seventh grade. Following a series of happy accidents, he found himself building an immersive cyber range for IBM.
securityintelligence.webp 2019-02-08 13:00:03 Employees Are Working From Home - Do You Know Where Your Remote Work Policy Is? (lien direct) >A good remote work policy covers a broad range of categories, from employment rules to expense reporting to legal obligations. But the data security provisions are probably the most important.
securityintelligence.webp 2019-02-08 11:40:03 Now That You Have a Machine Learning Model, It\'s Time to Evaluate Your Security Classifier (lien direct) Now that you've identified an AI solution and selected a suitable algorithm for your machine learning model, you're ready to measure the effectiveness of your security classifier.
securityintelligence.webp 2019-02-07 12:30:03 6 Steps Every New CISO Should Take to Set Their Organization Up for Success (lien direct) >Starting a new job in the CISO role can feel overwhelming. But the time for security to be seen as a key player - and to have a major business impact - has never been better.
securityintelligence.webp 2019-02-06 15:30:04 Design Your IAM Program With Your Users in Mind (lien direct) >To gain the buy-in you need to make your IAM program successful, it's important to consider your employees' goals and needs during the design process.
securityintelligence.webp 2019-02-06 14:45:03 To Improve Critical Infrastructure Security, Bring IT and OT Together (lien direct) >Strong collaboration between IT and OT is a critical step in improving the security of critical infrastructure systems.
securityintelligence.webp 2019-02-06 11:00:05 IcedID Operators Using ATSEngine Injection Panel to Hit E-Commerce Sites (lien direct) >The X-Force research team investigated the IcedID Trojan's two-step injection attack that enables it to steal access credentials and payment card data from e-commerce customers in North America.
securityintelligence.webp 2019-02-05 13:55:02 How \'Mini CEO\' Laurene Hummer Engineers Better Identity and Access Management (lien direct) Laurene Hummer used to answer society's big energy questions. Now she's helping you access your applications more easily as the "mini CEO" of IBM Security's identity and access management offering.
securityintelligence.webp 2019-02-05 13:20:04 It\'s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare (lien direct) Cybersecurity industry leaders should define a new threat intelligence model that is three-dimensional, nonlinear, rooted in elementary number theory and that applies vector calculus. Threat Guideline
securityintelligence.webp 2019-02-04 12:45:05 Drive Innovation With Your Security Strategy in 2019 (lien direct) >As we enter the second month of 2019, organizations should make sure their security strategy accounts for emerging trends, such as the erosion of customer trust and the cybersecurity skills gap.
securityintelligence.webp 2019-02-04 12:45:03 Manage Emerging Cybersecurity Risks by Rallying Around Mutual Concerns (lien direct) >Chief information security officers (CISOs) are looking for ways to set the tone for the year and have more engaged conversations with top leadership regarding cybersecurity risks. Guideline
securityintelligence.webp 2019-02-01 16:10:03 Data Breach Fatigue Makes Every Day Feel Like Groundhog Day (lien direct) >The incessant stream of high-profile data breaches can make every day seem like Groundhog Day. How can businesses combat data breach fatigue and rebuild trust through improved breach response? Data Breach
securityintelligence.webp 2019-01-31 16:00:04 AI May Soon Defeat Biometric Security, Even Facial Recognition Software (lien direct) >Threat actors will soon gain access to artificial intelligence (AI) tools that will enable them to defeat multiple kinds of authentication systems, even biometric security.
securityintelligence.webp 2019-01-31 11:00:03 Hey Siri, Get My Coffee, Hold the Malware (lien direct) >According to IBM X-Force IRIS research, there are several security concerns that should be taken into consideration before using Siri Shortcuts. Malware
Last update at: 2024-04-29 11:07:47
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter