What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2018-04-18 11:56:05 When Nobody Controls Your Object Stores - Except You (lien direct) >Object stores are inexpensive and scalable, but how can you be sure your CSP will properly handle your encryption keys? How can you maintain the flexibility to switch CSPs if necessary?
securityintelligence.webp 2018-04-18 11:26:04 Lessons From the Marsh \'Global Cyber Risk Perception Survey\': Disconnects Persist Despite Increased Executive Involvement (lien direct) Despite in increased involvement of various stakeholders in risk management, a recent risk perception survey revealed a persistent disconnect between executives and the security function.
securityintelligence.webp 2018-04-17 12:11:04 Collaboration Among Security Vendors Is the Threat Management Solution of the Future (lien direct) >To stay ahead of tomorrow's cyberthreats, organizations need a threat management solution that consolidates disparate security products into a centralized platform.
securityintelligence.webp 2018-04-17 11:46:04 Security at Your Fingertips: Introducing a New App for Security Professionals (lien direct) >The new IBM app for security professionals allows users to assess the latest happenings in the world of cybersecurity intelligence, news and even the current state of their security environment.
securityintelligence.webp 2018-04-17 10:01:04 Adversarial AI: As New Attack Vector Opens, Researchers Aim to Defend Against It (lien direct) >While fraudsters have yet to master adversarial AI, the only way for the security community to get ahead of the emerging threat is through collaborative defense.
securityintelligence.webp 2018-04-16 10:01:04 Cybersecurity\'s Next Major Challenge: Connecting Human and Machine Intelligence (lien direct) Today, IBM introduced the Resilient Incident Response Platform (IRP) with Intelligent Orchestration and X-Force Threat Management services to help organizations connect human and machine intelligence.
securityintelligence.webp 2018-04-16 09:58:04 Introducing IBM X-Force Threat Management: A Smarter Security Solution to Manage the 360-Degree Threat Life Cycle (lien direct) >With IBM X-Force Threat Management, IBM Security experts collaborate with clients on a prescriptive journey toward improved threat management maturity.
securityintelligence.webp 2018-04-16 09:51:04 IBM Resilient Delivers Robust Integrations Through Our Orchestration Ecosystem (lien direct) >Today we unveiled the next generation of incident response with the Resilient Incident Response Platform with Intelligent Orchestration.
securityintelligence.webp 2018-04-16 09:46:04 IBM Resilient Launches Intelligent Orchestration: The Next Generation of Incident Response (lien direct) >Today, we are proud to announce the launch of Intelligent Orchestration with the next-generation of the Resilient Incident Response Platform (IRP).
securityintelligence.webp 2018-04-13 13:32:02 Neighborhood Watch: Uniting the Data Security Community Through Software Development Kits (lien direct) >Software development kits enable technology partners to build integrations that fill in gaps and extend the functionality of core products, boosting collaboration and innovation among cyberdefenders.
securityintelligence.webp 2018-04-13 13:11:04 Open Banking: Tremendous Opportunity for Consumers, New Security Challenges for Financial Institutions (lien direct) >New security standards around open banking focus on multifactor authentication and monitoring of transactions but largely ignore device security.
securityintelligence.webp 2018-04-12 14:51:04 Social Engineering: A Trick as Old as Time (lien direct) >Social engineering dates back to ancient times. Today, the most common forms of social trickery include baiting, vishing, phishing and other schemes designed to exploit human nature.
securityintelligence.webp 2018-04-12 11:41:04 How Effective Is Security Awareness Training for Threat Prevention? (lien direct) >Employees represent the first line of defense against cyberthreats, and effective security awareness training is more crucial than ever given the volatility and sophistication of the threat landscape.
securityintelligence.webp 2018-04-12 11:31:04 Breaking Down the Security Immune System: Proactive Database Protection Through SIEM Integration (lien direct) >Security analysts can maximize the effectiveness of their incident response capabilities by integrating disparate tools such as database firewalls and UBA with a strong SIEM solution.
securityintelligence.webp 2018-04-11 13:27:01 It\'s Time to Bring Cloud Environments Out of the Shadows (lien direct) Business leaders often rush to migrate corporate assets to cloud environments to boost productivity and lower costs, but adopting cloud services without proper oversight can put data at risk. Guideline
securityintelligence.webp 2018-04-11 11:46:03 Your RSA Conference 2018 Survival Guide: Plan Ahead and Party On (lien direct) >To get the most out of your RSA Conference experience, plan ahead, arrive early, build time into your schedule to unwind with peers and, perhaps most importantly, stay hydrated.
securityintelligence.webp 2018-04-11 10:26:03 Where Are You in Your GDPR Journey? (lien direct) >With the regulation set to take effect in less than 60 days, time is running out to prepare for GDPR. But even if you've yet to start, it's not too late to complete your GDPR journey before May 25.
securityintelligence.webp 2018-04-10 12:01:03 Keep Your Eyes on the Threat Horizon to Improve Incident Response (lien direct) >By keeping their eyes on the threat horizon, security professionals can implement better incident response strategies to contend with evolving cybercriminal tactics.
securityintelligence.webp 2018-04-10 11:36:03 10 Takeaways From the ISO 31000:2018 Risk Management Guidelines (lien direct) >The International Standards Organization (ISO) released an updated version of its risk management guidelines to help security leaders engage top leadership in cyber risk decision-making. Guideline
securityintelligence.webp 2018-04-09 12:21:04 The Future of Cognitive Security Is Now (lien direct) >Is cognitive security all hype, or can AI-powered tools help organizations defend their networks against evolving cyberthreats today?
securityintelligence.webp 2018-04-09 11:51:03 Previewing RSA 2018: Collaboration, Orchestration and Augmented Intelligence (lien direct) >Our team at is optimistic about the future, and we believe that small teams can do impossibly big things. IBM Security experts will explain how at RSA 2018 in San Francisco.
securityintelligence.webp 2018-04-06 13:31:03 How to Get the Most Out of the RSA Conference 2018 (lien direct) >There's something for every cybersecurity enthusiast at this year's RSA Conference, including masterful keynotes, stirring panels and vendor showcases featuring the latest technologies in the field.
securityintelligence.webp 2018-04-06 13:11:03 Strengthening Cybersecurity\'s Weakest Links With Deep Network Insights (lien direct) With the right SIEM solution, organizations can generate deep network insights to gain visibility into security weaknesses and determine when and where critical assets are most vulnerable.
securityintelligence.webp 2018-04-05 11:25:04 Financial Malware Trends and Predictions: Organized Cybercrime Continues to Rise (lien direct) >As security tools improve, malicious actors are increasingly operating as organized cybergangs and less sophisticated actors are falling behind, according to X-Force analysis of malware trends.
securityintelligence.webp 2018-04-05 09:56:03 In Plain Sight: Why Military Veterans Are a Great Fit for Cybersecurity Careers (lien direct) To help close the skills gap, IBM supported the launch of TechVets, a nonprofit organization dedicated to helping veterans and service leavers transition into cybersecurity careers.
securityintelligence.webp 2018-04-04 16:11:04 March\'s Top Cybersecurity News Stories: Responding to Attacks, Women in Security and a New Community for Security Pros (lien direct) In this month's cybersecurity news, major cities suffered crippling ransomware attacks, new research revealed a lack of incident response preparedness and IBM launched a community for security pros.
securityintelligence.webp 2018-04-04 10:01:03 2018 IBM X Force Report: Shellshock Fades, Gozi Rises and Insider Threats Soar (lien direct) >The latest IBM X-Force report highlighted threats stemming from misconfigured cloud servers and inadvertent insider negligence and examined malware trends from the 2017 that could continue into 2018.
securityintelligence.webp 2018-04-03 12:36:02 Clearing the Hurdles: Why Companies Have Not Implemented Basic Best Practices for Mobile Security (lien direct) Recent research has shown that companies are sacrificing mobile security for expediency and business performance.
securityintelligence.webp 2018-04-03 12:01:03 Relieving Alert Fatigue With Personally Tailored Threat Intelligence (lien direct) >By tailoring threat intelligence to the specific concerns of the analysts consuming it, organizations can reduce alert fatigue and achieve higher levels of security maturity.
securityintelligence.webp 2018-04-03 11:26:02 Are Enterprises Ready to Introduce Smart Assistants in the Workplace? (lien direct) >The introduction of smart assistants into the workplace is inevitable, and while they do carry unique risks, they are no more severe than the risks associated with widely deployed IoT devices.
securityintelligence.webp 2018-04-02 13:16:03 Reducing Dwell Time With Automated Incident Response (lien direct) >As the threat landscape evolves, it is increasingly important for organizations large and small to invest in automated incident response solutions to reduce dwell time and eliminate alert fatigue.
securityintelligence.webp 2018-04-02 12:11:04 Five Steps for Investigating and Responding to Employee Fraud (lien direct) >In the rush to deflect blame in the wake of an insider attack, many organizations fail to answer critical questions that could help them avoid similar cases of employee fraud in the future.
securityintelligence.webp 2018-04-02 11:46:03 Know Your Security X\'s and O\'s: Your Cyberdefense Team Is Only as Good as Its Threat Intelligence (lien direct) Just like a college basketball team needs to know its X's and O's to win the big game and cut down the nets, a security team needs threat intelligence to win the ongoing battle against cyberthreats.
securityintelligence.webp 2018-03-30 11:41:02 Five Surprising Reasons to Invest in Better Security Training (lien direct) >Security training programs should go beyond the basics and address why phishing attacks, social engineering schemes and other insider threats impact employees personally.
securityintelligence.webp 2018-03-29 12:11:04 Failure to Communicate Critical Data Risk to Business Leaders Can Have Perilous Consequences (lien direct) >To avoid the disastrous consequences of a breach, security professionals must be able to effectively communicate critical data risk in a language business leaders can understand. Guideline
securityintelligence.webp 2018-03-29 11:41:03 The Account Checker Knocking at Your Door (lien direct) >Hear that sound? It's not opportunity knocking - it's an account checker trying to access your site using stolen login credentials.
securityintelligence.webp 2018-03-28 12:51:02 Putting the \'I\' in CISO: Why the Security Leader Must Become an Influencer (lien direct) To become an influencer within his or her organization, the security leader must effectively communicate with lines of business, engage with the board - and avoid abusing his or her veto power. Guideline
securityintelligence.webp 2018-03-28 12:36:02 Windows Device Management: From XP to 10 and Everything in Between (lien direct) The traditional Windows device management solutions that IT admins have used for years are evolving into unified endpoint management solutions to fit the needs of today's security landscape.
securityintelligence.webp 2018-03-27 17:01:02 A Letter From the Future: It\'s January 2019 and Hackers Are Stealing Your Data (lien direct) Welcome to the future. It's January 2019 and cybercriminals are stealing your customer data. How will you use AI to execute your incident response plan and master the basics to avoid future incidents?
securityintelligence.webp 2018-03-27 12:26:02 Push for Progress: Empowering Women in Cybersecurity With Voice, Vision and Innovation (lien direct) Although International Women's Day has come and gone, the push to empower women in cybersecurity and educate young women about their career options is a year-long effort.
securityintelligence.webp 2018-03-26 14:07:03 IBM Sustains a Leadership Position in 2018 Gartner Magic Quadrant for Application Security Testing (lien direct) IBM sustained its position in the "Leaders" Quadrant in the 2018 Gartner Magic Quadrant for Application Security Testing, which spanned 12 total vendors. Guideline
securityintelligence.webp 2018-03-26 11:59:05 A W-2 Nor\'easter: Digging SOC Analysts Out From Under Tax Fraud False Positives (lien direct) SOC analysts face blizzardlike conditions during tax season as false positives pile up and legitimate tax fraud alerts are liable to fly under the radar.
securityintelligence.webp 2018-03-26 11:18:04 Why You Should Drop Everything and Enable Two-Factor Authentication Immediately (lien direct) Login credentials are a favorite target of today's cybercriminals, and two-factor authentication is now crucial to meet bare-minimum security standards.
securityintelligence.webp 2018-03-23 13:01:03 Signs That Your Security Program Is Going Nowhere Fast (lien direct) Even if you have all the training, policies and technologies under the sun, your security program is useless if your organization lacks common goals and self-awareness about its defense capabilities.
securityintelligence.webp 2018-03-23 11:26:05 An Introduction to HTTP Response Headers for Security (lien direct) HTTP response headers aim to help protect web applications from cross-site scripting (XSS), man-in-the-middle (MitM) attacks, clickjacking, cross-site request forgery and other threat vectors.
securityintelligence.webp 2018-03-22 12:51:04 Generative Adversarial Networks and Cybersecurity: Part 2 (lien direct) Researchers have shown how generative adversarial networks (GANs) can be applied to cybersecurity tasks such as cracking passwords and identifying hidden data in high-quality images.
securityintelligence.webp 2018-03-22 12:46:01 Understanding the Relationship Between AI and Cybersecurity (lien direct) While some observers fear a Skynet-esque future of malicious, self-aware machines, Dudu Mimran envisions a world in which AI and cybersecurity work together to keep emerging threats in check.
securityintelligence.webp 2018-03-21 13:11:03 The Real Reasons Behind Your Web Security Woes (lien direct) Many organizations still struggle with application and web security due to numerous persistent challenges, most of which relate to lack of oversight, poor planning and human error.
securityintelligence.webp 2018-03-21 12:56:01 Managing Apple Devices Is as Easy as D-E-P (lien direct) Apple's new Device Enrollment Platform (DEP) enables the technology giant to carve out a larger presence in the enterprise space and makes managing Apple devices easier than ever.
securityintelligence.webp 2018-03-20 12:11:03 When It Comes to Cyber Risks, 2018 Is No Time to Play Games (lien direct) Security teams had best bring their A-game to compete against ever-more sophisticated threat actors as new cyber risks emerge and evolve in 2018.
Last update at: 2024-05-15 20:08:32
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter