What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2018-03-20 12:01:01 Enterprise Security Lessons From the Crypto-Mining Craze (lien direct) Recent research has failed to pin down exactly how the current crypto-mining craze is trending, but companies can derive many key enterprise security lessons from the latest headline-grabbing threat.
securityintelligence.webp 2018-03-19 12:31:02 Three Pitfalls to Avoid on Your Data Security Journey (lien direct) The EU General Data Protection Regulation (GDPR) has called for enterprises to assess existing data security policies and procedures. What does this mean for your organization's efforts?
securityintelligence.webp 2018-03-19 12:03:04 Security Intelligence at the Strategic, Operational and Tactical Levels (lien direct) By optimizing intelligence at the strategic, operational and tactical levels, organizations can promote collaboration and bolster the incident response capabilities of their security teams.
securityintelligence.webp 2018-03-18 20:01:01 Security Pros Get an IBM Security Community They Can Call Their Own (lien direct) The new IBM Security Community enables cybersecurity professionals to connect with peers, share threat intelligence and glean insights from subject matter experts.
securityintelligence.webp 2018-03-18 17:01:01 LIVE from IBM Think 2018: Security and Resiliency Campus (lien direct) This week is "showtime" for IBM Think 2018 in Las Vegas! This blog will be updated regularly with the latest event announcements and highlights.
securityintelligence.webp 2018-03-18 13:01:01 Dr. Cole Is in the House at IBM Think (lien direct) When it comes to cybersecurity, companies today have so much to do and so much to focus on that they often do not have time to stop think about the longterm consquences of their policies. General Information
securityintelligence.webp 2018-03-16 13:06:02 Four Reasons Why I\'m Excited About IBM Think 2018 (lien direct) At Think 2018, attendees will have the opportunity to learn about multiple areas of study, rub elbows with experts, attend illuminating sessions and more.
securityintelligence.webp 2018-03-16 11:56:00 At Your Own Risk: Managing Internet of Things (IoT) Risks for Industrial and Utility Companies (lien direct) A new IBM Institute of Business Value (IBV) report found that many energy and utilities companies are unprepared to deal with Internet of Things (IoT) threats.
securityintelligence.webp 2018-03-16 11:01:04 Great Expectations: Building a Winning Cybersecurity Franchise With a Security Operations Center (lien direct) Like any good sports franchise, a successful security operations center must be built to win now and to meet the ever-evolving challenges of the future.
securityintelligence.webp 2018-03-15 13:02:00 Is Your Security Equipped to Bridge the Digital Transformation Divide? (lien direct) Companies are embracing digital transformation to connect with more customers, devices and data than ever before. However, this introduces new risks that security teams must be prepared to address.
securityintelligence.webp 2018-03-15 12:01:02 Generative Adversarial Networks and Cybersecurity: Part 1 (lien direct) Generative adversarial networks are neural networks that compete in a game in which a generator attempts to fool a discriminator with examples that look similar to a training set.
securityintelligence.webp 2018-03-15 12:01:01 Quantum Computing and Cryptography: What You Need to Know (lien direct) Quantum computing will introduce new risks in the coming decades, but it also has the potential to revolutionize the way organizations safeguard business-critical and personal data.
securityintelligence.webp 2018-03-14 12:28:04 Hit by the Digital Wave? How Security and Compliance Leaders Can Become Future-Ready (lien direct) Organizations that find themselves behind the compliance maturity curve can use the upcoming GDPR as an opportunity to transform their security and compliance programs.
securityintelligence.webp 2018-03-14 10:11:00 New Ponemon Report: Too Many Organizations Don\'t Have a Plan to Respond to Incidents (lien direct) Most organizations around the world lack a consistent incident response plan and thus are unprepared to manage the repercussions of a cyberattack, according to a recent Ponemon report.
securityintelligence.webp 2018-03-13 15:06:01 Doctor, Lawyer or Cybercrime Fighter? Inspiring Youth Starts With Cybersecurity Career Awareness (lien direct) How can we inspire the next generation of cybercrime fighters? IT professionals, teachers and parents must drive cybersecurity career awareness among students in all levels of education.
securityintelligence.webp 2018-03-13 12:22:05 Practicing Your Crisis Response: How Well Can You Handle Right of Boom? (lien direct) A data breach simulation is a great way to test your team's crisis response capabilities and prepare executives to deal with the aftermath of a cyberattack.
securityintelligence.webp 2018-03-13 12:01:01 Bringing Digital Transformation to Insurance (lien direct) Insurance providers can build trust - and win over crucial market segments - by embracing digital transformation. General Information
securityintelligence.webp 2018-03-12 12:11:02 Privacy Laws and Cybersecurity Sleuthing: When Worlds Collide (lien direct) WHOIS data isn't going away - don't panic - but there are uncertainties about its future and how it will be impacted by cybersecurity privacy laws, such as the EU's General Data Protection Regulation. ★★★★★
securityintelligence.webp 2018-03-12 11:56:00 Implementing O&A: Why Intelligence Is the Key to Strategic Orchestration (lien direct) By implementing orchestration and automation (O&A), security leaders can deliver the real-time threat intelligence their understaffed analyst teams need to punch above their weight. Guideline ★★
securityintelligence.webp 2018-03-09 13:36:00 Identity Protection: The First Defense Against a Data Breach (lien direct) Upcoming cybersecurity regulations mandate stricter access controls, but strong identity protection requires a multifactor authentication solution that does more than simply check compliance boxes.
securityintelligence.webp 2018-03-08 14:46:00 Tracking Malicious Insiders: Catch Me If You Can (lien direct) A UBA solution powered by machine learning enables security teams to model normal behavior and track subtle changes in user activity to identify malicious insiders. ★★
securityintelligence.webp 2018-03-08 01:01:00 Seize the Day: Celebrating Women in Security (lien direct) International Women's Day is March 8, and IBM is joining the #PressforProgress by asking six inspiring women in security their thoughts on the industry and the next generation of security workers. General Information
securityintelligence.webp 2018-03-07 13:26:00 A Fresh Look at Malware and Mobile Threat Prevention (lien direct) Mobile threat prevention enables organizations to proactively protect their devices, users, apps and data from malicious actors.
securityintelligence.webp 2018-03-07 13:15:05 When Blocking and Tackling Strategies Fail, Take a Page Out of the Threat Hunting Playbook (lien direct) Many organizations still rely on reactive blocking and tackling strategies, but proactive threat hunting is the only way to detect the type of chatter that is indicative of an impending attack.
securityintelligence.webp 2018-03-06 14:11:00 The Security Operations Center Is Evolving Into a Risk Analytics Center (lien direct) The traditional mission of security is evolving under the influence of several key trends regarding the functions, staffing, processes and core capabilities of the security operations center.
securityintelligence.webp 2018-03-06 13:45:05 Machine Learning Is Our Best Weapon Against Spiraling Cyberthreats (lien direct) To defend their confidential data from increasingly sophisticated cybercriminals, security teams must leverage machine learning to perform analytical tasks that are too tedious for humans to complete.
securityintelligence.webp 2018-03-06 12:35:05 February\'s Top Cybersecurity News Stories: Nice Phish You Got There (lien direct) Last month's cybersecurity news cycle featured a tricky cryptocurrency-stealing Trojan, targeted phishing attacks, interesting insights about millennials' identity protection habits and more.
securityintelligence.webp 2018-03-05 14:30:05 Mobile Banking Trojans as Keen on Cryptocurrency as PC Malware (lien direct) Cybercriminals are emulating PC malware to develop mobile banking Trojans that leverage malicious miners to steal cryptocurrency and deliver it to attacker-controlled wallets.
securityintelligence.webp 2018-03-05 12:40:05 Young People May Shun Passwords, But That Doesn\'t Mean They\'re Less Identity-Conscious (lien direct) IBM's new "Future of Identity Study" revealed that while millennials are less likely to use complex passwords than their older counterparts, they embrace new technologies for identity protection. ★★★★
securityintelligence.webp 2018-03-05 11:55:05 With Less Than 90 Days to Go, Are You Ready for GDPR Enforcement? (lien direct) Are you there yet? Which "there" are we talking about? Unless you've been hiding under a rock for the past year, you probably know that I'm talking about your GDPR plan. ★★★★
securityintelligence.webp 2018-03-02 14:40:05 Pause for a Sec: Initiating Cultural Change for SecDevOps (lien direct) SecDevOps requires an organizationwide cultural shift that holds everyone responsible for security and redefines the development team's role in properly securing applications from the start.
securityintelligence.webp 2018-03-02 14:31:01 Stop Wasting Resources: How to Ease Your Endpoint Management and Security Struggles (lien direct) At Think 2018, IBM experts and clients will show attendees how they can solve their endpoint management and security challenges and stop wasting their valuable cybersecurity resources with IBM BigFix.
securityintelligence.webp 2018-03-01 14:00:05 [Free E-Guide] Mitigate Your Business Risk Strategically With Cognitive Application Security Testing (lien direct) Instead of waiting around for an incident to occur, organizations of all sizes need an application security testing program based on a fundamental understanding of risk management.
securityintelligence.webp 2018-03-01 12:55:05 Why You Need Collaborative Defense in Depth (lien direct) A collaborative defense strategy enables companies to unite siloed departments, integrate threat defense and extend security capabilities beyond the individual power of each tool.
securityintelligence.webp 2018-03-01 12:11:00 Road Trip or Road Rash? Compliance, Meet Security (lien direct) Just because you're in compliance doesn't mean you're doing everything you can to protect your enterprise and customer data. Learn how to bridge the gap between security and compliance at Think 2018.
securityintelligence.webp 2018-02-28 11:20:04 Top Three Reasons Why GDPR Can Be Good for Business (lien direct) In addition to its obvious data privacy benefits, a commitment to GDPR readiness can help organizations promote collaboration across business units and improve enterprisewide security culture.
securityintelligence.webp 2018-02-27 13:05:04 An Interview With IBM Master Inventor James Kozloski on His New Security Patent: The Cognitive Honeypot (lien direct) An innocent conversation with a colleague at the office printing station led IBM Master Inventor James Kozloski to land a security patent for the cognitive honeypot, a tool to combat spear phishing.
securityintelligence.webp 2018-02-27 12:55:05 SEC Releases Updated Guidance For Cybersecurity Disclosure (lien direct) The SEC released updated guidance regarding cybersecurity disclosure for public companies, emphasizing the responsibility of executives to report material risks and incidents.
securityintelligence.webp 2018-02-27 12:15:05 A Behind-the-Scenes Look at the Emerging Trend of National Cryptocurrency: Estcoin (lien direct) As digital coins continue to dominate tech headlines, Estonia is on the verge of launching its own national cryptocurrency known as estcoin.
securityintelligence.webp 2018-02-26 12:50:05 (Déjà vu) IBM, a Leader Again in the 2018 Gartner Magic Quadrant for IGA (lien direct) IBM was recently named a Leader, again, in Gartner's 2018 Magic Quadrant for Identity Governance and Administration (IGA). Guideline
securityintelligence.webp 2018-02-26 12:25:04 XMRig: Father Zeus of Cryptocurrency Mining Malware? (lien direct) XMRig is popular among cybercriminals because it is open source, meaning threat actors can make relatively simple changes to its code to convert the tool into a cryptojacking mechanism.
securityintelligence.webp 2018-02-26 11:41:00 Building Resilience Against Evolving Technology: An Interview With a Cyber Risk Expert (lien direct) According to IBM cyber risk expert Tim Roberts, security professionals must do a better job of communicating with top management as the technology landscape evolves and new threats emerge.
securityintelligence.webp 2018-02-23 13:25:04 Listen to Your Cassandras to Avoid Cybersecurity Disasters (lien direct) Instead of dismissing experts who warn of impending cybersecurity disasters, business leaders should thoroughly investigate the issue at hand and prepare a response to minimize the potential damage. Guideline
securityintelligence.webp 2018-02-23 12:35:04 No More Jumping Through Hoops: Consolidating Access Requests in One Platform With Identity Governance and Intelligence (lien direct) With ServiceNow and IBM Identity Governance and Intelligence, users no longer have to jump through hoops to submit requests for access to enterprise applications and physical assets.
securityintelligence.webp 2018-02-23 12:25:04 Simplicity Is the Key to Progress in Endpoint Security (lien direct) To remain secure amid the growing cybersecurity skills gap, it's critical for organizations to reduce the complexity of endpoint security processes wherever possible.
securityintelligence.webp 2018-02-22 12:55:04 Discover Silent Identity and Access Management (lien direct) Silent identity and access management (IAM) solutions are designed to work seamlessly in the background so that users don't even know it's there, intervening only when problems arise. ★★
securityintelligence.webp 2018-02-22 12:30:04 Unified Endpoint Management: Why a UEM Solution Is a Compulsory Choice for a Modern Organization (lien direct) Modern organizations need a UEM solution that harnesses the power of cognitive technology to deliver enhanced data security, maximize user productivity and increase operational efficiency.
securityintelligence.webp 2018-02-21 13:11:00 Why Data Security Should Be at the Top of Every Retailer\'s Shopping List (lien direct) Thanks largely to recent news headlines, consumers are becoming more aware of security concerns, meaning that retailers must improve their data security practices to earn customer trust.
securityintelligence.webp 2018-02-21 11:00:05 IBM X Force IRIS Uncovers Active Business Email Compromise Campaign Targeting Fortune 500 Companies (lien direct) IBM X-Force IRIS observed a widespread business email compromise (BEC) campaign targeting many Fortune 500 companies that exploits flaws in common accounts payable processes. ★★★★★
securityintelligence.webp 2018-02-20 13:15:04 The Journey to Security and Cyber Resiliency (lien direct) At Think 2018, attendees will learn how an integrated approach to security and resiliency can help them prevent cyberattacks and effectively respond to the ones that slip through their defenses.
Last update at: 2024-05-16 01:07:53
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter