What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2018-05-17 13:27:00 What Does PwC\'s Annual Corporate Directors Survey Tell Us About Cyber Risks? (lien direct) What can PwC's 2017 Annual Corporate Directors Survey tell us about cyber risks? Explore the key takeaways, including insights about strategy oversight and board oversight of IT and security. ★★★
securityintelligence.webp 2018-05-16 17:02:01 Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 2 (lien direct) >With so much data being moved to the cloud, it's more crucial than ever for companies to deploy advanced firewalls, anomaly detection and other defense mechanisms to mitigate the risk of DDoS attacks.
securityintelligence.webp 2018-05-16 11:42:01 Achieving GDPR Compliance: The Spark That Will Light a Fire of Change (lien direct) >A recent survey conducted by IBM Security and the IBM Institute for Business Value found that many organizations around the world are embracing GDPR compliance as an opportunity for innovation.
securityintelligence.webp 2018-05-16 11:17:01 Achieving Cloud Security Through Gray Skies (lien direct) >When it comes to cloud security challenges, the issue is one of complexity. Many organizations lack a centralized view of all workloads across all of their environments.
securityintelligence.webp 2018-05-15 13:52:02 4 Essentials for Effective Security Awareness Training (lien direct) >Awareness experts weigh in about the essential elements for an awareness program that keeps users engaged - and helps them identify major threats to an organization's security posture.
securityintelligence.webp 2018-05-15 12:07:01 Best Practices for Designing a Security Operations Center (lien direct) >Designing a security operations center (SOC) is not as simple as setting and forgetting an SIEM solution. Security leaders must consider human factors, business needs, budgetary constraints and more. Guideline
securityintelligence.webp 2018-05-15 09:22:01 What Is Next-Generation Privileged Account Management? (lien direct) >Organizations need a privileged account management (PAM) solution that integrates seamlessly with the existing security environment - and helps security teams enforce least privilege policies.
securityintelligence.webp 2018-05-14 15:57:00 Threat Intelligence Machine Learning Adoption: Time to Ditch the Black Box Security Analytics (lien direct) >While studies reveal the majority of CTI adopters are dissatisfied with threat intelligence machine learning adoption, there's evidence the adversary is already using algorithms to their advantage.
securityintelligence.webp 2018-05-14 11:52:01 The Cherry on Top: Add Value to Existing Risk Management Activities With Open Source Tools (lien direct) >Organizations with established risk management processes can drive efficiency and improve their overall risk posture by leveraging open source tools.
securityintelligence.webp 2018-05-14 11:27:00 Playing It Smart for Data Controllers and Processors (lien direct) >Organizations preparing for GDPR should reach out to their third-party vendors to clearly define the roles, expectations and responsibilities of data controllers and processors.
securityintelligence.webp 2018-05-11 13:17:00 Breaking Bad Behavior: Can AI Combat Insider Threats? (lien direct) >Artificial intelligence (AI) tools enable security teams to identify behavioral patterns that could point to insider threats more quickly. ★★
securityintelligence.webp 2018-05-11 13:07:00 Connect the Dots: IoT Security Risks in an Increasingly Connected World (lien direct) >Although connected devices make our daily lives easier, IoT data, if not properly secured, can cause serious financial and reputational damage to companies deploying and manufacturing this technology. ★★★★★
securityintelligence.webp 2018-05-10 11:52:01 What Matters Most During a Data Breach? How You React (lien direct) >With the GDPR coming into effect on May 25, the cost of a data breach is about to skyrocket. A comprehensive, regularly updated CSIRP can help IR teams contain the damage associated with a breach.
securityintelligence.webp 2018-05-10 11:27:00 Cut Through the Fog: Improve Cloud Visibility to Identify Shadow IT (lien direct) >Security teams need a single, scalable cloud solution that integrates seamlessly with a SIEM platform to identify shadow IT - and cut through the fog of cloud security.
securityintelligence.webp 2018-05-09 17:07:00 What Is the Current State of Cyber Resilience? (lien direct) >Although new research revealed that the state of cyber resilience is improving - especially regarding executive engagement - there is still room for improvement.
securityintelligence.webp 2018-05-09 12:22:01 Risk Acceptance 101: What Happens When Security Needs Go Unfunded? (lien direct) >The refusal of top leadership to fund security initiatives often translates to explicit, willful risk acceptance. Guideline ★★★★★
securityintelligence.webp 2018-05-09 11:12:00 A Whole New Ballgame: Applying the Immune System Approach to Sporting Event Cybersecurity (lien direct) Emerging mobile and cloud-based technologies present many new challenges pertaining to sporting event cybersecurity. ★★★
securityintelligence.webp 2018-05-08 14:00:04 WHOIS Behind Cyberattacks? Under GDPR, We May Not Know (lien direct) >GDPR's implementation on an issue relevant to the cybersecurity industry may well have negative consequences that (ironically) run contrary to its original intent. ★★★
securityintelligence.webp 2018-05-08 10:10:02 Mobile Financial Transactions Are Faster, But Are They Any Safer? (lien direct) >The mobile revolution has made it simpler and faster for banking customers to conduct financial transactions, but it has also expanded the attack surface for fraudsters aiming to steal sensitive data. ★★
securityintelligence.webp 2018-05-08 09:15:04 Reflecting on the Memcached Reflection Attacks: A Wake-Up Call for Developers (lien direct) >The memcached vulnerability isn't new, but attackers exploited it in late February to launch what might be the largest DDoS attack on record. ★★★★
securityintelligence.webp 2018-05-07 12:01:03 Why Collaborative Defense Is the Future of Endpoint Management (lien direct) >To improve endpoint management in today's threat landscape, IT organizations must embrace collaborative defense by integrating tools into a cohesive security ecosystem and sharing threat intelligence.
securityintelligence.webp 2018-05-07 10:41:01 If Video Killed the Radio, Will Malvertising Kill Your Website? (lien direct) >Malvertising isn't just a nuisance for internet users - it puts businesses and their customers at risk and compromises the integrity of the online advertising ecosystem.
securityintelligence.webp 2018-05-04 17:25:03 Data Privacy Regulations: Ensuring Mobile Data Protection in Light of Increasing Regulations (lien direct) >Organizations in every industry, from banking to retail, healthcare and more, are required to apply mobile data protection rules set by governments that impose massive fines in cases of noncompliance. Until the early 2000s, it was simpler to control data flows because information was mostly accessed from computers. Since then, companies have digitized their frameworks […]
securityintelligence.webp 2018-05-04 17:20:03 Class Is in Session: Improving Cybersecurity Awareness in the Education Sector (lien direct) >The education industry faces a security crisis, one that goes beyond protecting the classrooms and hallways. IT professionals in the education sector see cybersecurity as their top priority, consistently ranking it as their No. 1 concern. However, more than three-quarters of employees in the education field lack the cybersecurity awareness required to handle common privacy […]
securityintelligence.webp 2018-05-04 17:13:01 WannaCry Dominates Ransomware News in 2017, Drives 415 Percent Attack Boost (lien direct) >WannaCry drove a 415 percent increase in ransomware attacks and accounted for 90 percent of all detection reports in 2017. In addition to these eye-popping numbers, F-Secure’s “The Changing State of Ransomware” report also offered some positive ransomware news: The lack of big paydays for campaigns such as WannaCry and NotPetya are now causing a […] NotPetya Wannacry
securityintelligence.webp 2018-05-03 18:43:00 Debate Club: Comparing the Merits of Enterprise Mobility Management and Client Management Tools (lien direct) >For IT and security leaders, the ability to manage devices, apps and content are critical to end-user productivity and the protection of corporate information. There are two popular methods for doing this across smartphones, tablets, laptops and servers. For mobile devices, the technology is most commonly referred to as enterprise mobility management (EMM). For laptops, […] Guideline
securityintelligence.webp 2018-05-02 12:17:00 Why You Need New Mobile Security Best Practices for Business Travel (lien direct) >In recent years, the risks associated with passing through an airport have changed dramatically. This demands a complete rethink about mobile security best practices for international travel.
securityintelligence.webp 2018-05-02 11:42:00 April\'s Cybersecurity Recap: More AI, More IoT and a Push for More Privacy (lien direct) April's cybersecurity recap features more enterprises embracing AI and new insights into consumer perspectives on security.
securityintelligence.webp 2018-05-01 12:51:05 Analyzing PDF and Office Documents Delivered Via Malspam (lien direct) >Endpoint detection and antiphishing tools can help users filter basic spam email, but detecting malspam in PDF and Microsoft Office documents requires a more thorough investigation.
securityintelligence.webp 2018-05-01 11:32:00 Epic Fails in Data Security, Solutions Edition: Not Quantifying Your ROI (lien direct) >One of the most common epic fails in data security is the failure to quantify the ROI of the enterprise's data protection solutions.
securityintelligence.webp 2018-05-01 11:11:05 Simpler, Smarter Security With Intelligent Orchestration (lien direct) >IBM's new Intelligent Orchestration offering enables analysts to streamline their investigations via integrations and incident response playbooks.
securityintelligence.webp 2018-04-30 11:46:05 When It Comes to Cyber Risks, Your Leadership Cannot Afford a Failure of Imagination (lien direct) >A failure of imagination could cause business leaders fail to account for predictable cyber risks due to a misperception of the company's incident response capabilities and cyber resilience posture. Guideline
securityintelligence.webp 2018-04-30 11:06:05 How to Build a Corporate Culture of Cyber Awareness (lien direct) >The key to creating a culture of cyber awareness is to start small, set achievable goals and help employees understand how enterprise security affects their own privacy.
securityintelligence.webp 2018-04-27 12:01:05 What Is the Way Ahead for Derivatives Clearing and Prime Services? (lien direct) >Derivatives clearing and prime services providers face many new challenges, including intensifying regulatory requirements and legacy systems that can't keep up with evolving business models.
securityintelligence.webp 2018-04-27 11:16:05 Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 1 (lien direct) >Cybercriminals use DoS and DDoS attacks to distrupt services and take down networks and applications by sending overwhelming volumes of malicious traffic to target systems.
securityintelligence.webp 2018-04-26 13:36:05 Insights From RSAC 2018: Taking the Human Element Out of Security (lien direct) >At RSAC 2018, many speakers urged organizations to take the human element out of the security equation as much as possible by investing in automated tools and focusing on professional development.
securityintelligence.webp 2018-04-26 11:46:05 Is End-to-End IoT Security Financially Feasible - or Even Possible? (lien direct) >Organizations can build toward end-to-end IoT security by understanding the risks connected devices pose to their networks and analyzing how they interact with corporate data.
securityintelligence.webp 2018-04-25 13:27:02 RSA Conference 2018 Recap: Building a Foundation for Tomorrow\'s Cybersecurity (lien direct) At the RSA Conference 2018, speakers touched on topics such as the IoT, blockchain and cryptography and stoked meaningful conversations about diversity and other pressing issues in cybersecurity.
securityintelligence.webp 2018-04-25 12:01:05 Protecting Your Employees\' Home IT From Cyberthreats (lien direct) Helping employees protect their home IT reduces enterprise security risks and helps security leaders better safeguard corporate data. Guideline
securityintelligence.webp 2018-04-24 12:06:05 RSAC 2018 in Review: Highlights, Key Sessions and Emerging Industry Trends (lien direct) >At RSAC 2018, countless security experts and practitioners gathered in San Francisco to talk about emerging threats and how the cybersecurity industry can prepare to meet evolving challenges.
securityintelligence.webp 2018-04-24 11:41:05 Anti-I: The Future of AI-Generated Malware (lien direct) >As AI progresses, security professionals must prepare for the inevitability of machines writing their own malware to infect other machines in the not-so-distant future.
securityintelligence.webp 2018-04-24 11:31:05 Asking the Right Questions: Key Takeaways From the CAQ\'s \'Cybersecurity Risk Management Oversight\' Guidance (lien direct) The Center for Audit Quality (CAQ)'s "Cybersecurity Risk Management Oversight" guidance outlines key questions that board directors should ask about how the organization addresses risk.
securityintelligence.webp 2018-04-23 12:26:05 Don\'t Be Held for Ransom: Five Strategies to Secure Healthcare Data Against Cyberattacks (lien direct) Basic best practices, such as backing up data, patching vulnerable systems, segmenting networks, whitelisting apps and training employees, are the keys to protecting healthcare data from ransomware.
securityintelligence.webp 2018-04-23 11:56:04 Blockchain Technology: Conflicting Perspectives on Enterprise Security From the RSA Conference 2018 (lien direct) The topic of blockchain technology and its application to enterprise security was hotly debated at the RSA Conference 2018.
securityintelligence.webp 2018-04-23 11:06:05 How to Choose the Right Malware Classification Scheme to Improve Incident Response (lien direct) >Analysts can improve and automate their incident response processes by adopting the right malware classification scheme according to specific threat management goals.
securityintelligence.webp 2018-04-20 13:11:04 An Eagle Eye Over Network Security: Configuring Log Sources to Maximize SIEM Visibility (lien direct) >To get the most out of an SIEM solution, analysts must properly configure their log sources to generate alerts when they stop reporting for certain periods of time, depending on their priority level.
securityintelligence.webp 2018-04-20 13:07:02 Women in Security: Perspectives on Inclusion, Issues and Progress From the RSA Conference 2018 (lien direct) >At the RSA Conference 2018, industry leaders gathered to discuss issues surrounding women in security, including the key role of female IT professionals in closing the cybersecurity skills gap. Guideline
securityintelligence.webp 2018-04-19 13:12:04 As Cyber Risk Escalates, the C-Suite Must Take Action (lien direct) >As long as C-suite executives believe that cybersecurity is an IT issue, they will remain disengaged from the solutions and their role in supporting a robust cyber risk management strategy.
securityintelligence.webp 2018-04-19 10:56:04 What to Do When a Memory Corruption on an Input String Generates a DoS (lien direct) >When a special char in an application running on a common operating system generates a memory corruption issue, a holistic security immune system is the key to minimizing the impact of a DoS event.
securityintelligence.webp 2018-04-18 12:26:04 Q1 2018 Results: Gozi (Ursnif) Takes Larger Piece of the Pie and Distributes IcedID (lien direct) >Gozi took a larger slice of the financial malware pie and become the most active banking Trojan in 2017, according to the IBM X-Force Threat Intelligence Index 2018.
Last update at: 2024-05-15 16:07:58
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter