What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2018-12-21 14:20:02 More Than Just a Fad: Lessons Learned About Threat Hunting in 2018 (lien direct) >One cybersecurity capability that continues to prove it's here to stay is threat hunting, a proactive approach to discovering and mitigating threats. Threat
securityintelligence.webp 2018-12-21 12:10:02 How Allison Ritter Puts Security Lessons Into Action With Her Flare for Drama (lien direct) >A love of the visual arts and a passion for drama brought Allison Ritter to the IBM X-Force Command Center. She channels these passions to create engaging, interactive security lessons for clients.
securityintelligence.webp 2018-12-20 13:00:02 IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape (lien direct) >IBM X-Force's top security predictions for 2019 cover a range of potential attack schemes and consequences, from industry-specific prognostications to a rapid expansion of emerging criminal schemes. Threat
securityintelligence.webp 2018-12-19 13:00:02 Cloud Security With a Chance of Data Breaches (lien direct) >Companies should look for a cloud security solution that sits in front of the database and can send traffic to your existing tools without having to install any software on the database.
securityintelligence.webp 2018-12-18 13:00:02 Machine Learning Will Transform How We Detect Software Vulnerabilities (lien direct) >When used as part of the software development process, machine learning can help identify vulnerabilities before threat actors have a chance to exploit them. Threat
securityintelligence.webp 2018-12-18 11:55:01 From Naughty to NICE: Best Practices for K–12 Cybersecurity Education (lien direct) >The National Institute for Cybersecurity Education is leading the charge in K–12 security awareness training. Guideline
securityintelligence.webp 2018-12-17 16:45:02 Is It Time to Start a PSIRT? Why Your CSIRT May Not Be Enough (lien direct) >Your CSIRT protects your organizational network, but who secures your products? It may be time you started a PSIRT at your company.
securityintelligence.webp 2018-12-17 12:15:02 How I Hacked My Connected Car, and Other Thoughts on Vehicle Cybersecurity (lien direct) >Even if you're not into car hacks, you should still learn about the future of vehicle cybersecurity and the challenge it represents. But if you are, read on to learn how I hacked my connected car.
securityintelligence.webp 2018-12-17 11:40:01 How to Check for Blind Spots in Your Security Program (lien direct) >An effective security program does more than merely take on the appearance of cyber resilience. Learn how to look behind the curtain of your enterprise security.
securityintelligence.webp 2018-12-14 14:15:02 How Alex Rombak Uses His Hospitality Background to Provide Top Tier Technical Support (lien direct) >Alex Rombak has heard your jokes about tech support, and he doesn't mind. He knows the important role he plays in supply chain security, supporting financial institutions when things go wrong.
securityintelligence.webp 2018-12-14 12:50:01 3 Keys to Building a Scalable Incident Response Automation and Orchestration Plan (lien direct) >A robust, documented incident response plan is the foundation of a successful automation and orchestration program - but where do you begin?
securityintelligence.webp 2018-12-14 12:20:02 Stay on Top of Zero-Day Malware Attacks With Smart Mobile Threat Defense (lien direct) >Mobile threats are growing both in number and severity. To protect crucial data, organizations need mobile threat defense solutions that can replicate the accuracy of manual analysis on a large scale. Malware Threat
securityintelligence.webp 2018-12-13 13:05:01 Overcoming the Cloud Security Compliance Conundrum (lien direct) >Compliance with various regulations and cloud security requirements has expanded as technology and cloud uptake advance, leaving organizations with a challenging conundrum to solve.
securityintelligence.webp 2018-12-12 16:45:02 3 Security Business Benefits From a 2018 Gartner Magic Quadrant SIEM Leader (lien direct) >The main characteristics of a SIEM leader are centered around innovation in early threat detection, adaptation to customer environments and strong market presence. Threat Guideline ★★★
securityintelligence.webp 2018-12-12 12:05:01 Think Your Network Is Safe? If You Don\'t Have Visibility Into Hardware Vulnerabilities, Think Again (lien direct) Even organizations that rigorously patch software flaws are exposed to a growing range of cyberthreats if they lack visibility into hardware vulnerabilities. ★★★
securityintelligence.webp 2018-12-11 12:20:02 Why You Need a BGP Hijack Response Plan (lien direct) >BGP hijack attacks are increasing in popularity, but are still largely unaddressed in many organizational incident response plans. ★★
securityintelligence.webp 2018-12-10 13:05:01 Avoid Coal in Your Digital Stocking - Here\'s How to Improve Your Security Posture in 2019 (lien direct) As another year ends, it's time to review your cybersecurity practices from the past year. How can you improve your security posture in 2019? ★★★★
securityintelligence.webp 2018-12-10 12:10:02 The Simpler the Better? Looking Deeper Into the Malware Used in Brazilian Financial Cybercrime (lien direct) >The majority of financial cybercrime risks can be mitigated with continued user education and by placing the right controls on user devices to help protect against malware. Malware ★★★★
securityintelligence.webp 2018-12-07 15:35:01 How Tomer Agayev Fights Financial Fraud Through Curiosity, Suspicion and Education (lien direct) >As threat research team lead at Trusteer, Tomer guards the gateway to both known and unknown threats and passes along his insights to help banking customers protect themselves from social engineering. Threat Guideline
securityintelligence.webp 2018-12-07 13:50:01 Data Privacy Must Evolve Beyond Confidentiality (lien direct) >Most security systems are built with data confidentiality in mind, but effective data privacy will also emphasize integrity and availability.
securityintelligence.webp 2018-12-07 12:05:01 Protect the Keys to Your Kingdom With Privileged Access Management (lien direct) >The importance of implementing privileged access management (PAM) is undeniable. But how are organizations doing with actually implementing PAM solutions?
securityintelligence.webp 2018-12-06 13:00:02 5 More Retail Cybersecurity Practices to Keep Your Data Safe Beyond the Holidays (lien direct) >These five retail cybersecurity tips will help organizations mitigate cyberattacks and provide customers with the safest shopping experience during the holiday season.
securityintelligence.webp 2018-12-06 12:50:02 Machine Learning Algorithms Are Not One-Size-Fits-All (lien direct) >Before you can choose the right machine learning algorithms to serve your business' needs, you must understand the type of problem you're trying to solve and the type of training data you'll need.
securityintelligence.webp 2018-12-05 17:55:01 Advancing Security Operations Through the Power of a SIEM Platform (lien direct) >Thanks to a wealth of new capabilities, security operations teams that leverage a cutting-edge SIEM platform are better armed to defend their organizations from advanced and insider threats.
securityintelligence.webp 2018-12-05 14:45:01 Endpoint Management Missteps in the \'Die Hard\' Franchise: Viewing a Holiday Favorite Through a Cybersecurity Lens (lien direct) Security professionals can learn valuable lessons about endpoint management from the "Die Hard" franchise of holiday-themed thrillers.
securityintelligence.webp 2018-12-05 12:40:01 How Can Government Security Teams Overcome Obstacles in IT Automation Deployment? (lien direct) >IT automation is the future of security programs, but it's not simply plug-and-play. SOC leaders must implement this technology thoughtfully to unlock the full range of benefits. Guideline
securityintelligence.webp 2018-12-04 12:40:02 Achieve Community Immunity With Security Data Integration (lien direct) >With many enterprises unable to fill open roles for cybersecurity professionals, how can organizations boost collaboration to share security data and drive better outcomes?
securityintelligence.webp 2018-12-04 11:45:02 A New Privacy Frontier: Protect Your Organization\'s Gold With These 5 Data Risk Management Tips (lien direct) The enactment of recent privacy mandates is just the start. A comprehensive data risk management program established before more regulations go into effect is well worth its weight in gold.
securityintelligence.webp 2018-12-03 13:15:02 \'Tis the Season for Spreading Ad Malware (lien direct) Ad malware ramps up with the surge in online shopping activity during the holiday season. Taking a few precautionary steps can help consumers and security teams protect their devices and networks. Malware ★★★★★
securityintelligence.webp 2018-12-03 12:30:02 Cross-Industry Approaches to Managing Potentially Catastrophic Cyber Risks (lien direct) >In the security industry there is a range of cyber risks that can cause catastrophic damage to a business. What can we learn from other industries that manage these kinds of risks?
securityintelligence.webp 2018-12-03 12:05:02 Fight Evolving Cybersecurity Threats With a One-Two-Three Punch (lien direct) >Collaborative industry partnerships, a hardened attack surface and a well-practiced incident response plan are all critical in the fight against emerging cybersecurity threats.
securityintelligence.webp 2018-11-30 13:10:02 5 Tips for Uncovering Hidden Cyberthreats with DNS Analytics (lien direct) >By understanding the basics of DNS analytics, the common methods of attack and the tools available to security teams, you will be better prepared to protect your enterprise from hidden cyberthreats.
securityintelligence.webp 2018-11-30 12:55:01 How to Future-Proof Your Enterprise With Quantum-Safe Cryptography (lien direct) >Organizations that act now to upgrade to quantum-safe cryptography will be better positioned to reap the benefits of this emerging technology in the coming decades.
securityintelligence.webp 2018-11-30 12:30:02 Insights From European Customers on Cybersecurity and Security Awareness (lien direct) >Hot topics of conversation around European Cyber Security Month (ECSM) included the challenges and opportunities of cybersecurity, the blurred line between the good guys and bad actors, and more.
securityintelligence.webp 2018-11-29 13:30:03 5 Recommendations to Improve Retail Cybersecurity This Holiday Season (lien direct) >With extra web traffic and high order volumes coming in, the holiday shopping season can be a particularly perilous time for retail cybersecurity.
securityintelligence.webp 2018-11-29 12:05:01 How Daniel Gor Helps Protect the World - and His Grandparents - From Financial Fraud (lien direct) >If you've ever gotten a financial fraud alert from your bank, you can thank Daniel Gor for developing the automated processes by which fraud analysts monitor customers' behavioral patterns.
securityintelligence.webp 2018-11-28 13:15:02 Phish or Fox? A Penetration Testing Case Study From IBM X-Force Red (lien direct) >The IBM X-Force Red team recently ran into trouble on a black-box penetration testing assignment. Here's how the testers overcame the obstacles to ultimately establish a solid adversarial operation.
securityintelligence.webp 2018-11-28 13:10:02 Why Is the Retail Industry Still Lacking Security? (lien direct) >A recent survey found that the retail industry is among the least secure industries. What can retailers do to turn that around this holiday season?
securityintelligence.webp 2018-11-28 13:00:02 Is Your SOC Overwhelmed? Artificial Intelligence and MITRE ATT&CK Can Help Lighten the Load (lien direct) By adopting artificial intelligence solutions to help execute the MITRE ATT&CK framework, security teams can reduce dwell times, guide threat hunting endeavors and lighten the load of SOC analysts. Threat
securityintelligence.webp 2018-11-27 17:30:01 How to Defend Against Malvertising Drive-By Attacks (lien direct) >Malvertising - malware delivered by internet advertisements - can infect your computer even if you don't click on it. But there are steps you can take to protect yourself now. Malware
securityintelligence.webp 2018-11-27 13:00:02 Retail Security Hygiene: The Case for Seasonal Checkups (lien direct) >Retail companies should conduct security hygiene checkups as early as possible this holiday season to identify key threats across e-commerce systems, seasonal staffing policies and employee behaviors.
securityintelligence.webp 2018-11-26 12:35:02 We Need to Talk About NIST\'s Dropped Password Management Recommendations (lien direct) NIST has changed its long-standing recommendations for password management, favoring minimal user friction over complexity requirements and regular password updates.
securityintelligence.webp 2018-11-26 12:20:03 How to Prepare for the Coming 5G Security Threats (lien direct) >5G communications networks will empower a future that some are calling the "Fourth Industrial Revolution" - but security leaders must prepare for the coming 5G security threats. Guideline
securityintelligence.webp 2018-11-22 12:15:02 How Cloud Security Architect Andi Hudson Nurtures Today\'s Youth to Protect Tomorrow\'s Data (lien direct) When he's not helping clients stay on top of cloud security, Andi Hudson is reaching out to schools to spread awareness about careers in technology and the importance of data privacy.
securityintelligence.webp 2018-11-21 14:00:02 The Forrester Wave: Unified Endpoint Management, Q4 2018 - New Acronyms, New Leaders and How Device Management Has Evolved (lien direct) >IBM was named a leader in the "2018 Forrester Wave: Unified Endpoint Management, Q4 2018" report, and MaaS360 earned recognition as the best current offering in the marketplace. Guideline
securityintelligence.webp 2018-11-21 14:00:02 Cyber Monday 2018: 5 Best Practices to Protect Consumer Data (lien direct) >Cyber Monday 2018 is just around the corner, and customers and malicious actors alike are gearing up. Is your retail security ready to tackle e-commerce fraud and improve consumer data protection?
securityintelligence.webp 2018-11-21 12:50:02 Easy Does It! A Timely Look Into Fraud TTPs in the Brazilian Financial Cybercrime Landscape (lien direct) >In this first article of a two-part series, IBM X-Force exposes some of its research on the typical malware and tactics, techniques and procedures (TTPs) used in Brazilian financial cybercrime. Malware
securityintelligence.webp 2018-11-20 14:45:01 Why You Should Act Now to Prevent Peer-to-Peer Payments Network Fraud (lien direct) >Financial institutions seeking a piece of the hot P2P payments market must act to prevent network fraud with a multilayered prevention approach that includes a robust fraud detection engine.
securityintelligence.webp 2018-11-19 14:00:02 Retail Cybersecurity Is Lagging in the Digital Transformation Race, and Attackers Are Taking Advantage (lien direct) >Retail cybersecurity requires a large-scale transition to cope with new threat vectors, close significant infrastructure gaps, and extend security protocols across new cloud and SaaS platforms. Threat
securityintelligence.webp 2018-11-19 12:10:02 Soft Skills, Solid Benefits: Cybersecurity Staffing Shifts Gears to Bring in New Skill Sets (lien direct) >It's time to prioritize soft skills, re-evaluate recruitment practices and prepare for a future where the hard skills of AI-enhanced tools require a soft-side balance to drive cybersecurity success.
Last update at: 2024-04-29 09:07:44
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter