What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2018-02-20 12:45:04 The Art of Disclosing Your Incident Response Strategy to the Public (lien direct) As data breaches gain public attention, vulnerability disclosure becomes an increasingly crucial part of the incident response process.
securityintelligence.webp 2018-02-19 13:25:04 You Don\'t Have to Sacrifice Security for Convenience to Establish Digital Trust (lien direct) In an age of limited physical interaction, organizations need a way to establish digital trust without compromising the user experience.
securityintelligence.webp 2018-02-19 12:30:05 IBM Identity Study Shows Security May Be Financial Services Firms\' Best Defense Against Disruption (lien direct) According to the "IBM Future of Identity Study," consumers are beginning to prioritize security over convenience, making trust a crucial competitive advantage for financial institutions.
securityintelligence.webp 2018-02-16 12:45:04 Where Is Your Sensitive Information and Where Is It Going? (lien direct) To protect sensitive information, security professionals must know exactly where this data resides, who is accessing it, when it is being accessed and whether this activity violates policy.
securityintelligence.webp 2018-02-16 12:30:03 The Inconvenient Reality of Law Firm Security Challenges (lien direct) Organizations that take an IT-centric approach to law firm security risk exposing sensitive data to malicious actors and damaging client trust.
securityintelligence.webp 2018-02-15 13:55:04 Data Risk Management, Part 3: Assessing Risk Levels of Structured Versus Unstructured Data (lien direct) To protect their crown jewels from data thieves, organizations must determine the difference in risk levels between structured and unstructured data and prioritize accordingly.
securityintelligence.webp 2018-02-15 12:05:00 TrickBot\'s Cryptocurrency Hunger: Tricking the Bitcoin Out of Wallets (lien direct) TrickBot is getting in on the cryptocurrency gold rush, expanding its operations to target digital wallets and exchanges using serverside injections and other malicious tactics.
securityintelligence.webp 2018-02-14 13:36:00 How Cybercriminals Use Money Mule Accounts to Profit From Online Fraud (lien direct) As cybercriminal tactics evolve, banks must employ fraud detection solutions that leverage artificial intelligence to evaluate new registrations for signs of money mule activity.
securityintelligence.webp 2018-02-14 13:21:00 What Do You Get for Waking Up in Vegas at Think 2018? Application Security Testing Knowledge! (lien direct) At Think 2018, attendees will have an opportunity to glean knowledge about application security testing from some of the foremost experts in the field. ★★★★★
securityintelligence.webp 2018-02-13 12:30:03 Establishing Trust With Identity Governance Intelligence (lien direct) An identity governance solution that presents advanced analytics in plain business language is the key to establishing trust between IT and security teams and line-of-business managers.
securityintelligence.webp 2018-02-12 12:45:03 Using Data Protection Guidelines to Balance Security and Compliance in 2018 (lien direct) When organizations follow frameworks such as Gartner's Data-Centric Audit and Protection (DCAP) guidelines, security and compliance can coexist and even complement one another.
securityintelligence.webp 2018-02-09 12:30:30 How to Improve Cyber Literacy Within Your Organization (lien direct) The quest to promote cyber literacy is as old as the internet itself, but the increasing connectedness of the technology landscape is making it more important than ever.
securityintelligence.webp 2018-02-09 11:05:29 Read My Lips: Researchers Find Ways to Fool Speech Recognition Systems (lien direct) Researchers have devised ways to manipulate speech recognition systems to carry out hidden commands, suggesting that cybercriminals will soon develop similar ways to exploit this technology. ★★★
securityintelligence.webp 2018-02-08 13:11:04 Why Device ID May Not Be Enough to Stop Fraud (lien direct) To defeat increasingly sophisticated fraudsters, security teams should pair their fraud detection tools with a device ID spoofing mechanism that automatically adapts to new threats.
securityintelligence.webp 2018-02-08 12:00:34 In 2018, Security-as-a-Service Is Where It\'s At (lien direct) Security leaders are increasingly turning to security-as-a-service (SECaaS) to keep up with rapidly evolving threats and address the growing skills shortage. Guideline
securityintelligence.webp 2018-02-07 13:09:37 Three Characteristics of a Successful Agile Security and Risk Management Implementation (lien direct) To keep up with increasingly sophisticated threat actors, many of whom have begun using AI in their attacks, organizations must fully embrace Agile security and risk management strategies.
securityintelligence.webp 2018-02-07 12:45:26 Architecting Segmentation Defense in the Cloud (lien direct) Architecting segmentation defense in the cloud can be time-consuming, but it can offer tremendous security benefits at little to no additional cost.
securityintelligence.webp 2018-02-06 13:30:40 Minimizing the Encryption Blast Radius (lien direct) The only way to reduce the encryption blast radius is to keep moving forward and embrace the advancements the technology has undergone over the years.
securityintelligence.webp 2018-02-06 12:10:34 The Expanding Role of the CISO: Seven Attributes of a Successful Security Leader (lien direct) The role of the security leader is expanding, and CISOs must posses strong communication skills, extensive technical knowledge, analytical minds and the respect of their peers to be successful. Guideline
securityintelligence.webp 2018-02-06 11:50:28 January\'s Top Cybersecurity News Stories: Jackpotting, Cryptocurrency Mining and Other Emerging Trends (lien direct) The start of February is a great time for organizations and individuals to sweep away the confetti and dig into the most significant cybersecurity news stories from the past month.
securityintelligence.webp 2018-02-05 13:30:00 Using Machine Learning to Make Faster, Smarter Decisions About Insider Threats (lien direct) Security professionals need a comprehensive way to analyze user behavior, automatically respond to reports of suspicious activity and manage user access accordingly to thwart insider threats.
securityintelligence.webp 2018-02-05 12:50:35 What Can We Learn From the World Economic Forum\'s Cyber Resilience Playbook (lien direct) The WEF's "Cyber Resilience: Playbook for Public-Private Collaboration" aims to help governments align security policies with key values and promote collaboration both within and across borders.
securityintelligence.webp 2018-02-05 09:00:19 What You Should Know Before You Put Your GDPR Program in Motion (lien direct) Organizations should take these steps to put their GDPR readiness plans in motion and make the transition as smooth as possible once the regulation takes effect in May.
securityintelligence.webp 2018-02-02 13:00:26 Android Device Management: Sweet Features, No Toothache (lien direct) Android device management doesn't need to be difficult, as long as security leaders consider the privacy needs of the organization, IT department and user population before rolling out a UEM solution. Guideline
securityintelligence.webp 2018-02-02 12:50:23 Securing User Identities With Blockchain Technology (lien direct) The security world is searching for a replacement for passwords. Passwords are becoming irrelevant because they can be discovered and broken as computers gain processing power. In addition, stolen user identities are increasingly cheap and easy to come by. Any solution will require a shift in how personal information is managed and stored - and […]
securityintelligence.webp 2018-02-02 12:45:02 Cloud Security Is a Moving Target (lien direct) There are many misconceptions about cloud security, but one thing is for certain: Cybercriminals will always target high-value data wherever it resides.
securityintelligence.webp 2018-02-01 17:13:58 Why Endpoint Management Is Critical to Security Strategy (lien direct) Endpoint management is typically the responsibility of the IT operations or infrastructure teams, not the security team. So why should security care about endpoint hygiene? Pervasive Endpoint Vulnerabilities Attacks come from all directions, and many of them originate on endpoints. In fact, according to IDC, 70 percent of successful breaches begin at the endpoint. As […]
securityintelligence.webp 2018-02-01 12:10:58 10 Steps to Evaluate Cloud Service Providers for FedRAMP Compliance (lien direct) Companies that wish to do business with federal government agencies in the cloud must complete these 10 steps to achieve FedRAMP compliance.
securityintelligence.webp 2018-01-31 13:15:45 In 2018, Data Security Is No Longer an Underdog (lien direct) Once the underdog of the enterprise security world, data security is finally gaining momentum as a driver of revenue.
securityintelligence.webp 2018-01-31 13:05:46 Open Banking and PSD2: Disruption or Confusion? (lien direct) If you’re not yet familiar with the concept of open banking, you’re not alone. U.K. consumer advice firm Which? reported that 92 percent of the public is unaware of the initiative, which officially launched on Jan. 13, 2018, to promote the use of application programming interfaces (APIs) to enable developers to build applications to augment […]
securityintelligence.webp 2018-01-31 13:00:50 Who Needs a College Degree? Filling the Skills Gap With Qualified New Collar Professionals (lien direct) A college degree was once thought to guarantee a successful career. For some professions, structured coursework and vetted certification is the only way to ensure that a student was prepared to take on a challenging job. Other industries, however, don’t necessarily equate the lack of a college education to a lack of qualification. These roles […]
securityintelligence.webp 2018-01-30 13:30:51 No Rest for the Weary: Applying Security Lessons From 2017 in the New Year (lien direct) How can it be that we are already through January and moving into February of the new year? I don’t know about you, but I still have a long list of resolutions to accomplish and I need to focus on what I can realistically get done in 2018. This makes me think about how everyone […]
securityintelligence.webp 2018-01-30 13:30:40 2018 Financial Malware Trends and Predictions: Organized Cybercrime Continues to Rise (lien direct) As we enter 2018, the financial cybercrime landscape is evolving. IBM X-Force research has been tracking cybercrime activity around the world, and in a new report, examined the cybercrime shifts of 2017 and what financial institutions can expect to see in 2018. Last year saw the rise of new cybergangs and the demise of others, […]
securityintelligence.webp 2018-01-30 06:30:42 Top Four Challenges That Can Create Tough Sledding for Your Data Security and Compliance Program (lien direct) A big data intelligence solution can free up security teams to focus on generating the data security and compliance insights business stakeholders demand in nearly real time.
securityintelligence.webp 2018-01-29 13:58:07 Highlights From the World Economic Forum\'s \'Global Risks Report 2018\' (lien direct) The World Economic Forum's "Global Risks Report 2018" warned of "the increased dangers of systemic breakdown" due to our overreliance on emerging technologies for critical systems and services.
securityintelligence.webp 2018-01-29 13:55:46 Creating an Incident Response Checklist to Prepare for a Data Breach (lien direct) When faced with an external attack or data breach, an organization is helpless unless it has an incident response plan firmly in place. The goal of such a plan is to minimize the damage of an attack, meaning that the recovery effort should take as little time as possible and avoid unnecessary costs, which include […]
securityintelligence.webp 2018-01-29 05:00:35 IBM Study: Consumers Weigh in on Biometrics, Authentication and the Future of Identity (lien direct) IBM Security's "Future of Identity Study" found that many consumers, especially millennials, are moving beyond passwords and using features such as biometric authentication to secure their identities.
securityintelligence.webp 2018-01-26 15:58:30 Is Your CISO a Jedi Warrior, an Admiral or a Diplomat? (lien direct) Take a look at some traits from the famous "Star Wars" characters we've grown to love and explore how those might be applicable to CISOs today.
securityintelligence.webp 2018-01-26 15:31:41 Choosing the Right Security Framework to Fit Your Business (lien direct) By adopting a hybrid security framework, organizations can cherry-pick the guidelines and compliance requirements that meet their unique business objectives.
securityintelligence.webp 2018-01-22 12:50:20 Data Risk Management, Part 2: Who Is Ultimately Accountable When a Big Breach Happens? (lien direct) By proactively determining who is responsible for data risk management before a data breach occurs, C-suite executives can help avoid such incidents in the first place.
securityintelligence.webp 2018-01-22 12:30:19 Building the Best Incident Response Team (lien direct) Building the right incident response team means looping in people outside of the IT and security teams.
securityintelligence.webp 2018-01-22 08:35:24 SecOps 2018: Cognitive Era and the Coming of GDPR (lien direct) As organizations prepare for GDPR in 2018, SecOps and cognitive technology will play crucial roles in helping to ensure improved security without compromising agility.
securityintelligence.webp 2018-01-19 12:50:17 No Degree, No Problem: Preparing Students for New Collar Jobs Through Alternative Education (lien direct) Many organizations across multiple sectors are creating new collar job opportunities to embrace the skills of aspiring professionals who lack traditional four-year college degrees.
securityintelligence.webp 2018-01-17 12:45:20 Secure and Seamless? Building Great Consumer Experiences With Silent IAM (lien direct) With silent IAM solutions, LOB executives and security professionals can verify and protect user identities without hindering the customer experience.
securityintelligence.webp 2018-01-17 12:42:21 The Risk Modeling Gotcha: Roles Are Like Hammers to Screws (lien direct) Roles are meant to drive efficiencies in provisioning, user management and recertifications, but many organizations still use them in risk modeling, impeding maturity and productivity.
securityintelligence.webp 2018-01-17 12:00:22 Increasing Security Preparedness and Awareness Among Board Members and Top Management (lien direct) To increase security preparedness and awareness among executives, CISOs need to communicate cyber risks in business terms and regularly assess their systems for vulnerabilities.
securityintelligence.webp 2018-01-16 10:50:25 Elevating Education on the Security and Resiliency Campus at Think 2018 (lien direct) Think 2018 offers attendees a unique opportunity to interact with IBM and industry experts, view hands-on demos and tackle today's top security issues.
securityintelligence.webp 2018-01-16 10:05:15 Meeting Identity and Access Management Challenges in the Era of Mobile and Cloud (lien direct) In our increasingly connected world, identity and access management is more crucial than ever for organizations seeking to empower their workforce with mobile and cloud technologies.
securityintelligence.webp 2018-01-16 10:00:16 Change Doesn\'t Happen All at Once: Navigating the GDPR Transformation Process (lien direct) After you've completed the Assess and Design phases of GDPR readiness, the next step is to implement and execute policies, processes and technologies to enhance your data privacy capabilities.
securityintelligence.webp 2018-01-12 13:30:28 Don\'t Leave Your Keys in the Ignition - Safeguard High-Value Data With Privileged Access Management (lien direct) For cybercriminals, failing to protect privileged credentials is like leaving the keys in your ignition. Implementing privileged access management is a crucial step toward minimizing cyber risks.
Last update at: 2024-05-15 22:08:10
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter