Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2018-03-20 12:01:01 |
Enterprise Security Lessons From the Crypto-Mining Craze (lien direct) |
Recent research has failed to pin down exactly how the current crypto-mining craze is trending, but companies can derive many key enterprise security lessons from the latest headline-grabbing threat.
|
|
|
|
|
2018-03-19 12:31:02 |
Three Pitfalls to Avoid on Your Data Security Journey (lien direct) |
The EU General Data Protection Regulation (GDPR) has called for enterprises to assess existing data security policies and procedures. What does this mean for your organization's efforts?
|
|
|
|
|
2018-03-19 12:03:04 |
Security Intelligence at the Strategic, Operational and Tactical Levels (lien direct) |
By optimizing intelligence at the strategic, operational and tactical levels, organizations can promote collaboration and bolster the incident response capabilities of their security teams.
|
|
|
|
|
2018-03-18 20:01:01 |
Security Pros Get an IBM Security Community They Can Call Their Own (lien direct) |
The new IBM Security Community enables cybersecurity professionals to connect with peers, share threat intelligence and glean insights from subject matter experts.
|
|
|
|
|
2018-03-18 17:01:01 |
LIVE from IBM Think 2018: Security and Resiliency Campus (lien direct) |
This week is "showtime" for IBM Think 2018 in Las Vegas! This blog will be updated regularly with the latest event announcements and highlights.
|
|
|
|
|
2018-03-18 13:01:01 |
Dr. Cole Is in the House at IBM Think (lien direct) |
When it comes to cybersecurity, companies today have so much to do and so much to focus on that they often do not have time to stop think about the longterm consquences of their policies.
|
General Information
|
|
|
|
2018-03-16 13:06:02 |
Four Reasons Why I\'m Excited About IBM Think 2018 (lien direct) |
At Think 2018, attendees will have the opportunity to learn about multiple areas of study, rub elbows with experts, attend illuminating sessions and more.
|
|
|
|
|
2018-03-16 11:56:00 |
At Your Own Risk: Managing Internet of Things (IoT) Risks for Industrial and Utility Companies (lien direct) |
A new IBM Institute of Business Value (IBV) report found that many energy and utilities companies are unprepared to deal with Internet of Things (IoT) threats.
|
|
|
|
|
2018-03-16 11:01:04 |
Great Expectations: Building a Winning Cybersecurity Franchise With a Security Operations Center (lien direct) |
Like any good sports franchise, a successful security operations center must be built to win now and to meet the ever-evolving challenges of the future.
|
|
|
|
|
2018-03-15 13:02:00 |
Is Your Security Equipped to Bridge the Digital Transformation Divide? (lien direct) |
Companies are embracing digital transformation to connect with more customers, devices and data than ever before. However, this introduces new risks that security teams must be prepared to address.
|
|
|
|
|
2018-03-15 12:01:02 |
Generative Adversarial Networks and Cybersecurity: Part 1 (lien direct) |
Generative adversarial networks are neural networks that compete in a game in which a generator attempts to fool a discriminator with examples that look similar to a training set.
|
|
|
|
|
2018-03-15 12:01:01 |
Quantum Computing and Cryptography: What You Need to Know (lien direct) |
Quantum computing will introduce new risks in the coming decades, but it also has the potential to revolutionize the way organizations safeguard business-critical and personal data.
|
|
|
|
|
2018-03-14 12:28:04 |
Hit by the Digital Wave? How Security and Compliance Leaders Can Become Future-Ready (lien direct) |
Organizations that find themselves behind the compliance maturity curve can use the upcoming GDPR as an opportunity to transform their security and compliance programs.
|
|
|
|
|
2018-03-14 10:11:00 |
New Ponemon Report: Too Many Organizations Don\'t Have a Plan to Respond to Incidents (lien direct) |
Most organizations around the world lack a consistent incident response plan and thus are unprepared to manage the repercussions of a cyberattack, according to a recent Ponemon report.
|
|
|
|
|
2018-03-13 15:06:01 |
Doctor, Lawyer or Cybercrime Fighter? Inspiring Youth Starts With Cybersecurity Career Awareness (lien direct) |
How can we inspire the next generation of cybercrime fighters? IT professionals, teachers and parents must drive cybersecurity career awareness among students in all levels of education.
|
|
|
|
|
2018-03-13 12:22:05 |
Practicing Your Crisis Response: How Well Can You Handle Right of Boom? (lien direct) |
A data breach simulation is a great way to test your team's crisis response capabilities and prepare executives to deal with the aftermath of a cyberattack.
|
|
|
|
|
2018-03-13 12:01:01 |
Bringing Digital Transformation to Insurance (lien direct) |
Insurance providers can build trust - and win over crucial market segments - by embracing digital transformation.
|
General Information
|
|
|
|
2018-03-12 12:11:02 |
Privacy Laws and Cybersecurity Sleuthing: When Worlds Collide (lien direct) |
WHOIS data isn't going away - don't panic - but there are uncertainties about its future and how it will be impacted by cybersecurity privacy laws, such as the EU's General Data Protection Regulation.
|
|
|
★★★★★
|
|
2018-03-12 11:56:00 |
Implementing O&A: Why Intelligence Is the Key to Strategic Orchestration (lien direct) |
By implementing orchestration and automation (O&A), security leaders can deliver the real-time threat intelligence their understaffed analyst teams need to punch above their weight.
|
Guideline
|
|
★★
|
|
2018-03-09 13:36:00 |
Identity Protection: The First Defense Against a Data Breach (lien direct) |
Upcoming cybersecurity regulations mandate stricter access controls, but strong identity protection requires a multifactor authentication solution that does more than simply check compliance boxes.
|
|
|
|
|
2018-03-08 14:46:00 |
Tracking Malicious Insiders: Catch Me If You Can (lien direct) |
A UBA solution powered by machine learning enables security teams to model normal behavior and track subtle changes in user activity to identify malicious insiders.
|
|
|
★★
|
|
2018-03-08 01:01:00 |
Seize the Day: Celebrating Women in Security (lien direct) |
International Women's Day is March 8, and IBM is joining the #PressforProgress by asking six inspiring women in security their thoughts on the industry and the next generation of security workers.
|
General Information
|
|
|
|
2018-03-07 13:26:00 |
A Fresh Look at Malware and Mobile Threat Prevention (lien direct) |
Mobile threat prevention enables organizations to proactively protect their devices, users, apps and data from malicious actors.
|
|
|
|
|
2018-03-07 13:15:05 |
When Blocking and Tackling Strategies Fail, Take a Page Out of the Threat Hunting Playbook (lien direct) |
Many organizations still rely on reactive blocking and tackling strategies, but proactive threat hunting is the only way to detect the type of chatter that is indicative of an impending attack.
|
|
|
|
|
2018-03-06 14:11:00 |
The Security Operations Center Is Evolving Into a Risk Analytics Center (lien direct) |
The traditional mission of security is evolving under the influence of several key trends regarding the functions, staffing, processes and core capabilities of the security operations center.
|
|
|
|
|
2018-03-06 13:45:05 |
Machine Learning Is Our Best Weapon Against Spiraling Cyberthreats (lien direct) |
To defend their confidential data from increasingly sophisticated cybercriminals, security teams must leverage machine learning to perform analytical tasks that are too tedious for humans to complete.
|
|
|
|
|
2018-03-06 12:35:05 |
February\'s Top Cybersecurity News Stories: Nice Phish You Got There (lien direct) |
Last month's cybersecurity news cycle featured a tricky cryptocurrency-stealing Trojan, targeted phishing attacks, interesting insights about millennials' identity protection habits and more.
|
|
|
|
|
2018-03-05 14:30:05 |
Mobile Banking Trojans as Keen on Cryptocurrency as PC Malware (lien direct) |
Cybercriminals are emulating PC malware to develop mobile banking Trojans that leverage malicious miners to steal cryptocurrency and deliver it to attacker-controlled wallets.
|
|
|
|
|
2018-03-05 12:40:05 |
Young People May Shun Passwords, But That Doesn\'t Mean They\'re Less Identity-Conscious (lien direct) |
IBM's new "Future of Identity Study" revealed that while millennials are less likely to use complex passwords than their older counterparts, they embrace new technologies for identity protection.
|
|
|
★★★★
|
|
2018-03-05 11:55:05 |
With Less Than 90 Days to Go, Are You Ready for GDPR Enforcement? (lien direct) |
Are you there yet? Which "there" are we talking about? Unless you've been hiding under a rock for the past year, you probably know that I'm talking about your GDPR plan.
|
|
|
★★★★
|
|
2018-03-02 14:40:05 |
Pause for a Sec: Initiating Cultural Change for SecDevOps (lien direct) |
SecDevOps requires an organizationwide cultural shift that holds everyone responsible for security and redefines the development team's role in properly securing applications from the start.
|
|
|
|
|
2018-03-02 14:31:01 |
Stop Wasting Resources: How to Ease Your Endpoint Management and Security Struggles (lien direct) |
At Think 2018, IBM experts and clients will show attendees how they can solve their endpoint management and security challenges and stop wasting their valuable cybersecurity resources with IBM BigFix.
|
|
|
|
|
2018-03-01 14:00:05 |
[Free E-Guide] Mitigate Your Business Risk Strategically With Cognitive Application Security Testing (lien direct) |
Instead of waiting around for an incident to occur, organizations of all sizes need an application security testing program based on a fundamental understanding of risk management.
|
|
|
|
|
2018-03-01 12:55:05 |
Why You Need Collaborative Defense in Depth (lien direct) |
A collaborative defense strategy enables companies to unite siloed departments, integrate threat defense and extend security capabilities beyond the individual power of each tool.
|
|
|
|
|
2018-03-01 12:11:00 |
Road Trip or Road Rash? Compliance, Meet Security (lien direct) |
Just because you're in compliance doesn't mean you're doing everything you can to protect your enterprise and customer data. Learn how to bridge the gap between security and compliance at Think 2018.
|
|
|
|
|
2018-02-28 11:20:04 |
Top Three Reasons Why GDPR Can Be Good for Business (lien direct) |
In addition to its obvious data privacy benefits, a commitment to GDPR readiness can help organizations promote collaboration across business units and improve enterprisewide security culture.
|
|
|
|
|
2018-02-27 13:05:04 |
An Interview With IBM Master Inventor James Kozloski on His New Security Patent: The Cognitive Honeypot (lien direct) |
An innocent conversation with a colleague at the office printing station led IBM Master Inventor James Kozloski to land a security patent for the cognitive honeypot, a tool to combat spear phishing.
|
|
|
|
|
2018-02-27 12:55:05 |
SEC Releases Updated Guidance For Cybersecurity Disclosure (lien direct) |
The SEC released updated guidance regarding cybersecurity disclosure for public companies, emphasizing the responsibility of executives to report material risks and incidents.
|
|
|
|
|
2018-02-27 12:15:05 |
A Behind-the-Scenes Look at the Emerging Trend of National Cryptocurrency: Estcoin (lien direct) |
As digital coins continue to dominate tech headlines, Estonia is on the verge of launching its own national cryptocurrency known as estcoin.
|
|
|
|
|
2018-02-26 12:50:05 |
(Déjà vu) IBM, a Leader Again in the 2018 Gartner Magic Quadrant for IGA (lien direct) |
IBM was recently named a Leader, again, in Gartner's 2018 Magic Quadrant for Identity Governance and Administration (IGA).
|
Guideline
|
|
|
|
2018-02-26 12:25:04 |
XMRig: Father Zeus of Cryptocurrency Mining Malware? (lien direct) |
XMRig is popular among cybercriminals because it is open source, meaning threat actors can make relatively simple changes to its code to convert the tool into a cryptojacking mechanism.
|
|
|
|
|
2018-02-26 11:41:00 |
Building Resilience Against Evolving Technology: An Interview With a Cyber Risk Expert (lien direct) |
According to IBM cyber risk expert Tim Roberts, security professionals must do a better job of communicating with top management as the technology landscape evolves and new threats emerge.
|
|
|
|
|
2018-02-23 13:25:04 |
Listen to Your Cassandras to Avoid Cybersecurity Disasters (lien direct) |
Instead of dismissing experts who warn of impending cybersecurity disasters, business leaders should thoroughly investigate the issue at hand and prepare a response to minimize the potential damage.
|
Guideline
|
|
|
|
2018-02-23 12:35:04 |
No More Jumping Through Hoops: Consolidating Access Requests in One Platform With Identity Governance and Intelligence (lien direct) |
With ServiceNow and IBM Identity Governance and Intelligence, users no longer have to jump through hoops to submit requests for access to enterprise applications and physical assets.
|
|
|
|
|
2018-02-23 12:25:04 |
Simplicity Is the Key to Progress in Endpoint Security (lien direct) |
To remain secure amid the growing cybersecurity skills gap, it's critical for organizations to reduce the complexity of endpoint security processes wherever possible.
|
|
|
|
|
2018-02-22 12:55:04 |
Discover Silent Identity and Access Management (lien direct) |
Silent identity and access management (IAM) solutions are designed to work seamlessly in the background so that users don't even know it's there, intervening only when problems arise.
|
|
|
★★
|
|
2018-02-22 12:30:04 |
Unified Endpoint Management: Why a UEM Solution Is a Compulsory Choice for a Modern Organization (lien direct) |
Modern organizations need a UEM solution that harnesses the power of cognitive technology to deliver enhanced data security, maximize user productivity and increase operational efficiency.
|
|
|
|
|
2018-02-21 13:11:00 |
Why Data Security Should Be at the Top of Every Retailer\'s Shopping List (lien direct) |
Thanks largely to recent news headlines, consumers are becoming more aware of security concerns, meaning that retailers must improve their data security practices to earn customer trust.
|
|
|
|
|
2018-02-21 11:00:05 |
IBM X Force IRIS Uncovers Active Business Email Compromise Campaign Targeting Fortune 500 Companies (lien direct) |
IBM X-Force IRIS observed a widespread business email compromise (BEC) campaign targeting many Fortune 500 companies that exploits flaws in common accounts payable processes.
|
|
|
★★★★★
|
|
2018-02-20 13:15:04 |
The Journey to Security and Cyber Resiliency (lien direct) |
At Think 2018, attendees will learn how an integrated approach to security and resiliency can help them prevent cyberattacks and effectively respond to the ones that slip through their defenses.
|
|
|
|