Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2018-02-20 12:45:04 |
The Art of Disclosing Your Incident Response Strategy to the Public (lien direct) |
As data breaches gain public attention, vulnerability disclosure becomes an increasingly crucial part of the incident response process.
|
|
|
|
|
2018-02-19 13:25:04 |
You Don\'t Have to Sacrifice Security for Convenience to Establish Digital Trust (lien direct) |
In an age of limited physical interaction, organizations need a way to establish digital trust without compromising the user experience.
|
|
|
|
|
2018-02-19 12:30:05 |
IBM Identity Study Shows Security May Be Financial Services Firms\' Best Defense Against Disruption (lien direct) |
According to the "IBM Future of Identity Study," consumers are beginning to prioritize security over convenience, making trust a crucial competitive advantage for financial institutions.
|
|
|
|
|
2018-02-16 12:45:04 |
Where Is Your Sensitive Information and Where Is It Going? (lien direct) |
To protect sensitive information, security professionals must know exactly where this data resides, who is accessing it, when it is being accessed and whether this activity violates policy.
|
|
|
|
|
2018-02-16 12:30:03 |
The Inconvenient Reality of Law Firm Security Challenges (lien direct) |
Organizations that take an IT-centric approach to law firm security risk exposing sensitive data to malicious actors and damaging client trust.
|
|
|
|
|
2018-02-15 13:55:04 |
Data Risk Management, Part 3: Assessing Risk Levels of Structured Versus Unstructured Data (lien direct) |
To protect their crown jewels from data thieves, organizations must determine the difference in risk levels between structured and unstructured data and prioritize accordingly.
|
|
|
|
|
2018-02-15 12:05:00 |
TrickBot\'s Cryptocurrency Hunger: Tricking the Bitcoin Out of Wallets (lien direct) |
TrickBot is getting in on the cryptocurrency gold rush, expanding its operations to target digital wallets and exchanges using serverside injections and other malicious tactics.
|
|
|
|
|
2018-02-14 13:36:00 |
How Cybercriminals Use Money Mule Accounts to Profit From Online Fraud (lien direct) |
As cybercriminal tactics evolve, banks must employ fraud detection solutions that leverage artificial intelligence to evaluate new registrations for signs of money mule activity.
|
|
|
|
|
2018-02-14 13:21:00 |
What Do You Get for Waking Up in Vegas at Think 2018? Application Security Testing Knowledge! (lien direct) |
At Think 2018, attendees will have an opportunity to glean knowledge about application security testing from some of the foremost experts in the field.
|
|
|
★★★★★
|
|
2018-02-13 12:30:03 |
Establishing Trust With Identity Governance Intelligence (lien direct) |
An identity governance solution that presents advanced analytics in plain business language is the key to establishing trust between IT and security teams and line-of-business managers.
|
|
|
|
|
2018-02-12 12:45:03 |
Using Data Protection Guidelines to Balance Security and Compliance in 2018 (lien direct) |
When organizations follow frameworks such as Gartner's Data-Centric Audit and Protection (DCAP) guidelines, security and compliance can coexist and even complement one another.
|
|
|
|
|
2018-02-09 12:30:30 |
How to Improve Cyber Literacy Within Your Organization (lien direct) |
The quest to promote cyber literacy is as old as the internet itself, but the increasing connectedness of the technology landscape is making it more important than ever.
|
|
|
|
|
2018-02-09 11:05:29 |
Read My Lips: Researchers Find Ways to Fool Speech Recognition Systems (lien direct) |
Researchers have devised ways to manipulate speech recognition systems to carry out hidden commands, suggesting that cybercriminals will soon develop similar ways to exploit this technology.
|
|
|
★★★
|
|
2018-02-08 13:11:04 |
Why Device ID May Not Be Enough to Stop Fraud (lien direct) |
To defeat increasingly sophisticated fraudsters, security teams should pair their fraud detection tools with a device ID spoofing mechanism that automatically adapts to new threats.
|
|
|
|
|
2018-02-08 12:00:34 |
In 2018, Security-as-a-Service Is Where It\'s At (lien direct) |
Security leaders are increasingly turning to security-as-a-service (SECaaS) to keep up with rapidly evolving threats and address the growing skills shortage.
|
Guideline
|
|
|
|
2018-02-07 13:09:37 |
Three Characteristics of a Successful Agile Security and Risk Management Implementation (lien direct) |
To keep up with increasingly sophisticated threat actors, many of whom have begun using AI in their attacks, organizations must fully embrace Agile security and risk management strategies.
|
|
|
|
|
2018-02-07 12:45:26 |
Architecting Segmentation Defense in the Cloud (lien direct) |
Architecting segmentation defense in the cloud can be time-consuming, but it can offer tremendous security benefits at little to no additional cost.
|
|
|
|
|
2018-02-06 13:30:40 |
Minimizing the Encryption Blast Radius (lien direct) |
The only way to reduce the encryption blast radius is to keep moving forward and embrace the advancements the technology has undergone over the years.
|
|
|
|
|
2018-02-06 12:10:34 |
The Expanding Role of the CISO: Seven Attributes of a Successful Security Leader (lien direct) |
The role of the security leader is expanding, and CISOs must posses strong communication skills, extensive technical knowledge, analytical minds and the respect of their peers to be successful.
|
Guideline
|
|
|
|
2018-02-06 11:50:28 |
January\'s Top Cybersecurity News Stories: Jackpotting, Cryptocurrency Mining and Other Emerging Trends (lien direct) |
The start of February is a great time for organizations and individuals to sweep away the confetti and dig into the most significant cybersecurity news stories from the past month.
|
|
|
|
|
2018-02-05 13:30:00 |
Using Machine Learning to Make Faster, Smarter Decisions About Insider Threats (lien direct) |
Security professionals need a comprehensive way to analyze user behavior, automatically respond to reports of suspicious activity and manage user access accordingly to thwart insider threats.
|
|
|
|
|
2018-02-05 12:50:35 |
What Can We Learn From the World Economic Forum\'s Cyber Resilience Playbook (lien direct) |
The WEF's "Cyber Resilience: Playbook for Public-Private Collaboration" aims to help governments align security policies with key values and promote collaboration both within and across borders.
|
|
|
|
|
2018-02-05 09:00:19 |
What You Should Know Before You Put Your GDPR Program in Motion (lien direct) |
Organizations should take these steps to put their GDPR readiness plans in motion and make the transition as smooth as possible once the regulation takes effect in May.
|
|
|
|
|
2018-02-02 13:00:26 |
Android Device Management: Sweet Features, No Toothache (lien direct) |
Android device management doesn't need to be difficult, as long as security leaders consider the privacy needs of the organization, IT department and user population before rolling out a UEM solution.
|
Guideline
|
|
|
|
2018-02-02 12:50:23 |
Securing User Identities With Blockchain Technology (lien direct) |
The security world is searching for a replacement for passwords. Passwords are becoming irrelevant because they can be discovered and broken as computers gain processing power. In addition, stolen user identities are increasingly cheap and easy to come by. Any solution will require a shift in how personal information is managed and stored - and […]
|
|
|
|
|
2018-02-02 12:45:02 |
Cloud Security Is a Moving Target (lien direct) |
There are many misconceptions about cloud security, but one thing is for certain: Cybercriminals will always target high-value data wherever it resides.
|
|
|
|
|
2018-02-01 17:13:58 |
Why Endpoint Management Is Critical to Security Strategy (lien direct) |
Endpoint management is typically the responsibility of the IT operations or infrastructure teams, not the security team. So why should security care about endpoint hygiene? Pervasive Endpoint Vulnerabilities Attacks come from all directions, and many of them originate on endpoints. In fact, according to IDC, 70 percent of successful breaches begin at the endpoint. As […]
|
|
|
|
|
2018-02-01 12:10:58 |
10 Steps to Evaluate Cloud Service Providers for FedRAMP Compliance (lien direct) |
Companies that wish to do business with federal government agencies in the cloud must complete these 10 steps to achieve FedRAMP compliance.
|
|
|
|
|
2018-01-31 13:15:45 |
In 2018, Data Security Is No Longer an Underdog (lien direct) |
Once the underdog of the enterprise security world, data security is finally gaining momentum as a driver of revenue.
|
|
|
|
|
2018-01-31 13:05:46 |
Open Banking and PSD2: Disruption or Confusion? (lien direct) |
If you’re not yet familiar with the concept of open banking, you’re not alone. U.K. consumer advice firm Which? reported that 92 percent of the public is unaware of the initiative, which officially launched on Jan. 13, 2018, to promote the use of application programming interfaces (APIs) to enable developers to build applications to augment […]
|
|
|
|
|
2018-01-31 13:00:50 |
Who Needs a College Degree? Filling the Skills Gap With Qualified New Collar Professionals (lien direct) |
A college degree was once thought to guarantee a successful career. For some professions, structured coursework and vetted certification is the only way to ensure that a student was prepared to take on a challenging job. Other industries, however, don’t necessarily equate the lack of a college education to a lack of qualification. These roles […]
|
|
|
|
|
2018-01-30 13:30:51 |
No Rest for the Weary: Applying Security Lessons From 2017 in the New Year (lien direct) |
How can it be that we are already through January and moving into February of the new year? I don’t know about you, but I still have a long list of resolutions to accomplish and I need to focus on what I can realistically get done in 2018. This makes me think about how everyone […]
|
|
|
|
|
2018-01-30 13:30:40 |
2018 Financial Malware Trends and Predictions: Organized Cybercrime Continues to Rise (lien direct) |
As we enter 2018, the financial cybercrime landscape is evolving. IBM X-Force research has been tracking cybercrime activity around the world, and in a new report, examined the cybercrime shifts of 2017 and what financial institutions can expect to see in 2018. Last year saw the rise of new cybergangs and the demise of others, […]
|
|
|
|
|
2018-01-30 06:30:42 |
Top Four Challenges That Can Create Tough Sledding for Your Data Security and Compliance Program (lien direct) |
A big data intelligence solution can free up security teams to focus on generating the data security and compliance insights business stakeholders demand in nearly real time.
|
|
|
|
|
2018-01-29 13:58:07 |
Highlights From the World Economic Forum\'s \'Global Risks Report 2018\' (lien direct) |
The World Economic Forum's "Global Risks Report 2018" warned of "the increased dangers of systemic breakdown" due to our overreliance on emerging technologies for critical systems and services.
|
|
|
|
|
2018-01-29 13:55:46 |
Creating an Incident Response Checklist to Prepare for a Data Breach (lien direct) |
When faced with an external attack or data breach, an organization is helpless unless it has an incident response plan firmly in place. The goal of such a plan is to minimize the damage of an attack, meaning that the recovery effort should take as little time as possible and avoid unnecessary costs, which include […]
|
|
|
|
|
2018-01-29 05:00:35 |
IBM Study: Consumers Weigh in on Biometrics, Authentication and the Future of Identity (lien direct) |
IBM Security's "Future of Identity Study" found that many consumers, especially millennials, are moving beyond passwords and using features such as biometric authentication to secure their identities.
|
|
|
|
|
2018-01-26 15:58:30 |
Is Your CISO a Jedi Warrior, an Admiral or a Diplomat? (lien direct) |
Take a look at some traits from the famous "Star Wars" characters we've grown to love and explore how those might be applicable to CISOs today.
|
|
|
|
|
2018-01-26 15:31:41 |
Choosing the Right Security Framework to Fit Your Business (lien direct) |
By adopting a hybrid security framework, organizations can cherry-pick the guidelines and compliance requirements that meet their unique business objectives.
|
|
|
|
|
2018-01-22 12:50:20 |
Data Risk Management, Part 2: Who Is Ultimately Accountable When a Big Breach Happens? (lien direct) |
By proactively determining who is responsible for data risk management before a data breach occurs, C-suite executives can help avoid such incidents in the first place.
|
|
|
|
|
2018-01-22 12:30:19 |
Building the Best Incident Response Team (lien direct) |
Building the right incident response team means looping in people outside of the IT and security teams.
|
|
|
|
|
2018-01-22 08:35:24 |
SecOps 2018: Cognitive Era and the Coming of GDPR (lien direct) |
As organizations prepare for GDPR in 2018, SecOps and cognitive technology will play crucial roles in helping to ensure improved security without compromising agility.
|
|
|
|
|
2018-01-19 12:50:17 |
No Degree, No Problem: Preparing Students for New Collar Jobs Through Alternative Education (lien direct) |
Many organizations across multiple sectors are creating new collar job opportunities to embrace the skills of aspiring professionals who lack traditional four-year college degrees.
|
|
|
|
|
2018-01-17 12:45:20 |
Secure and Seamless? Building Great Consumer Experiences With Silent IAM (lien direct) |
With silent IAM solutions, LOB executives and security professionals can verify and protect user identities without hindering the customer experience.
|
|
|
|
|
2018-01-17 12:42:21 |
The Risk Modeling Gotcha: Roles Are Like Hammers to Screws (lien direct) |
Roles are meant to drive efficiencies in provisioning, user management and recertifications, but many organizations still use them in risk modeling, impeding maturity and productivity.
|
|
|
|
|
2018-01-17 12:00:22 |
Increasing Security Preparedness and Awareness Among Board Members and Top Management (lien direct) |
To increase security preparedness and awareness among executives, CISOs need to communicate cyber risks in business terms and regularly assess their systems for vulnerabilities.
|
|
|
|
|
2018-01-16 10:50:25 |
Elevating Education on the Security and Resiliency Campus at Think 2018 (lien direct) |
Think 2018 offers attendees a unique opportunity to interact with IBM and industry experts, view hands-on demos and tackle today's top security issues.
|
|
|
|
|
2018-01-16 10:05:15 |
Meeting Identity and Access Management Challenges in the Era of Mobile and Cloud (lien direct) |
In our increasingly connected world, identity and access management is more crucial than ever for organizations seeking to empower their workforce with mobile and cloud technologies.
|
|
|
|
|
2018-01-16 10:00:16 |
Change Doesn\'t Happen All at Once: Navigating the GDPR Transformation Process (lien direct) |
After you've completed the Assess and Design phases of GDPR readiness, the next step is to implement and execute policies, processes and technologies to enhance your data privacy capabilities.
|
|
|
|
|
2018-01-12 13:30:28 |
Don\'t Leave Your Keys in the Ignition - Safeguard High-Value Data With Privileged Access Management (lien direct) |
For cybercriminals, failing to protect privileged credentials is like leaving the keys in your ignition. Implementing privileged access management is a crucial step toward minimizing cyber risks.
|
|
|
|