What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2018-01-12 12:50:15 The High ROI of Cyberweapons: Five Factors Driving the Rise in Threats (lien direct) Due to their low barrier to entry, increasing availability and high return on investment, cyberweapons are becoming massively popular among threat actors.
securityintelligence.webp 2018-01-11 14:40:54 Identifying Named Pipe Impersonation and Other Malicious Privilege Escalation Techniques (lien direct) Security analysts can nip many cyberattacks in the bud by monitoring for named pipe impersonation and other activity indicative of privilege escalation.
securityintelligence.webp 2018-01-11 14:20:52 Four Key Lessons From NACD\'s \'2018 Governance Outlook\' About Managing Cyber Risks (lien direct) The National Association of Corporate Directors (NACD)'s "2018 Governance Outlook: Projections on Emerging Board Matters" offered key advice to help board directors engage with cyber risk management.
securityintelligence.webp 2018-01-10 14:45:35 Don\'t Get Scared - Get Back in Operation With the Right Incident Response Strategy (lien direct) For incident response teams, resuming normal operations in the wake of a cyberattack is the name of the game. However, lack of preparation and poor communication can impede recovery efforts.
securityintelligence.webp 2018-01-10 14:20:46 Multistep Authentication Is No Longer Enough for PCI Compliance (lien direct) To meet PCI compliance, organizations must implement multifactor authentication, as opposed to a multistep process, to protect the cardholder data environment from unauthorized access.
securityintelligence.webp 2018-01-09 18:05:14 Five Epic Fails in Data Security: Do You Know How to Avoid Them? (lien direct) By avoiding these common data security failures, organizations can protect their valuable assets from increasingly sophisticated cybercriminals and steer clear of the next major data breach.
securityintelligence.webp 2018-01-09 15:25:14 Where the CISO Should Sit on the Security Org Chart and Why It Matters (lien direct) The CISO's position on the security org chart influences the nature and frequency of interactions the security leader will have other executives - not to mention the security budget. Guideline
securityintelligence.webp 2018-01-08 17:09:47 Six Major Data Breach Trends From 2017 (lien direct) The IBM X-Force team monitored major data breach trends throughout 2017 and gleaned key insights to help companies avoid headline-grabbing security incidents and protect sensitive data.
securityintelligence.webp 2018-01-08 16:06:40 Blockchain Exploits and Mining Attacks on the Rise as Cryptocurrency Prices Skyrocket (lien direct) As the value of bitcoin and other cryptocurrencies skyrockets, fraudsters are developing new blockchain exploits and mining schemes to get their cut of the digital gold rush.
securityintelligence.webp 2018-01-04 03:56:11 CPU Vulnerability Can Allow Attackers to Read Privileged Kernel Memory and Leak Data (lien direct) A newly discovered hardware vulnerability underscores a microprocessor flaw that could allow an attacker to read data from privileged kernel memory.
securityintelligence.webp 2018-01-03 13:36:21 The Enterprise Imperative: Five Tips for Improving Incident Response (lien direct) According to IBM's Christopher Scott, who spoke at The Wall Street Journal's Pro Cybersecurity Executive Forum, the road to better incident response is "a marathon, not a sprint."
securityintelligence.webp 2018-01-03 11:56:17 No Place For Passivity in Cybersecurity Leadership (lien direct) Many organizations lack the cybersecurity leadership required to effectively defend their networks and proactively respond to data breaches when they do occur. Guideline
securityintelligence.webp 2018-01-02 12:01:17 Security\'s Time Management Crunch and How to Solve It (lien direct) It seems like there's never enough hours in the day for security professionals, but effective time management can positively impact your security posture in unimaginable ways.
securityintelligence.webp 2018-01-02 12:00:15 Five New Year\'s Resolutions to Help CISOs Improve Enterprise Security in 2018 (lien direct) CISOs can improve their enterprise security posture by adopting cognitive technology, educating executives, conducting incident response training and fostering a culture of security in 2018.
securityintelligence.webp 2017-12-29 13:05:09 Rinse, Wash, Repeat: Defining, Planning and Continuously Improving Your SIEM Strategy (lien direct) For security leaders, the process of defining an SIEM strategy is never complete. A successful deployment requires careful planning, regular review and a culture of continuous improvement. Guideline
securityintelligence.webp 2017-12-29 12:35:10 Transform Your Security Strategy to Avoid Digital Roadblocks (lien direct) To transform your security strategy, you must first establish a model of shared responsibility between security professionals and business units throughout the organization.
securityintelligence.webp 2017-12-28 12:56:09 Take a Dive: Deep Network Insights for Deeper Analytics (lien direct) Security analysts need access to deep network insights in the form of user behavior analytics to unlock the full potential of technologies such as artificial intelligence and machine learning.
securityintelligence.webp 2017-12-28 12:36:09 ADS-B and Aviation Cybersecurity: Should Passengers Be Concerned? (lien direct) ADS-B technology supplements pilots' situational awareness and provides valuable weather data, but it remains to be seen whether it will impact aviation cybersecurity and passengers' data privacy.
securityintelligence.webp 2017-12-27 13:01:09 Long Road Ahead or Unbridgeable Chasm? Lessons From the EY \'Global Information Security Survey\' (lien direct) The EY "Global Infomation Security Survey" revealed that CISOs and executives have a long road ahead when it comes to improving communication - but it is indeed a road, not an unbridgeable chasm.
securityintelligence.webp 2017-12-22 12:31:08 The Past, Present and Future of DNS Security (lien direct) As the fabric of the internet evolves, security professionals must be aware of DNS security threats, such as DDoS attacks and schemes designed to direct users to malicious websites.
securityintelligence.webp 2017-12-22 12:21:09 Drowning in a Sea of Passwords? It\'s Time to Adopt a Password Manager (lien direct) A password manager enables users to access all their login credentials with a single master password, eliminating the need to juggle multiple credentials to access various accounts.
securityintelligence.webp 2017-12-21 13:11:11 BGP Internet Routing: What Are the Threats? (lien direct) The rate of BGP internet routing attacks has not increased significantly in the past two years. It is a considerable threat, however, because it puts the stability of the internet at risk.
securityintelligence.webp 2017-12-21 13:06:05 Closing ATM Network Security Gaps to Stop Fraudsters in Their Tracks (lien direct) Banks are already privy to the threat of physical breaches, but many remain unaware of the ATM network security gaps that could enable fraudsters to access their systems.
securityintelligence.webp 2017-12-20 09:41:08 Readying Your Security Operations for 2018 and Beyond (lien direct) If you are planning to launch a new deployment or otherwise expand your security operations center (SOC) in 2018, ensure that cognitive technologies are available to help analysts digest threat data.
securityintelligence.webp 2017-12-20 09:36:06 Year in Review: How Did the Cyberthreat Landscape Change in 2017? (lien direct) Over the course of 2017, the cyberthreat landscape shifted to accommodate a sharper focus on pure data destruction for the sake of disruption rather than monetary gain.
securityintelligence.webp 2017-12-19 13:16:08 Mark Your Calendar for the Top Security Conferences of 2018 (lien direct) Security conferences offer IT professionals and enthusiasts an opportunity to network with peers, learn from experts and browse emerging technologies.
securityintelligence.webp 2017-12-19 12:46:06 Data Risk Management: How to Put Executives in the Driver\'s Seat (lien direct) Executives are increasingly viewing data risk management as an area that can reduce costs and increase information security.
securityintelligence.webp 2017-12-19 12:21:05 Cybersecurity Skills Wanted: Investigative and Analytical Minds, Lifelong Learners, Protectors and Consultants (lien direct) To keep up with the growing shortage of cybersecurity skills, companies are looking to tap new sources of talent, such as students and new collar workers.
securityintelligence.webp 2017-12-18 13:26:05 The Data Security Forecast Calls for Zero Trust (lien direct) To successfully implement a zero trust architecture, security teams must invest in data security solutions that continuously monitor access in real time.
securityintelligence.webp 2017-12-18 12:26:13 Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges (lien direct) Organizations that follow both the COSO enterprise risk management framework and the NIST CSF can vastly improve their cyber risk oversight and management.
securityintelligence.webp 2017-12-18 12:16:06 Looking Ahead: Three Bold Cybersecurity Predictions for 2018 (lien direct) As we wrap up one of the wildest years the industry has ever seen, the IBM Resilient team offered three bold cybersecurity predictions for 2018.
securityintelligence.webp 2017-12-15 12:56:05 Things to Consider When Calculating the Return on Security Investment (lien direct) The return on security investment is a crucial calculation to help CISOs demonstrate risks in business terms and gain executive buy-in for security tools.
securityintelligence.webp 2017-12-15 12:26:08 Are You Prepared for Omnichannel Fraud? (lien direct) Omnichannel fraud has evolved to exploit the myriad technologies retailers have developed to enable consumers to purchase goods anytime, anywhere.
securityintelligence.webp 2017-12-14 13:16:03 Secure Your Business Silently With Unified Identity and Access Management (lien direct) Unified identity and access management solutions from IBM enable security teams to silently protect their networks without disrupting the user experience.
securityintelligence.webp 2017-12-14 12:51:06 From Waterfall to SecDevOps: The Evolution of Security Philosophy (lien direct) Unlike the waterfall and agile approaches to development, SecDevOps requires security to be built into projects from the outset, not bolted on afterward.
securityintelligence.webp 2017-12-14 12:01:05 New Year, New Threats: Five Security Predictions That Will Take Hold in 2018 (lien direct) The IBM Security X-Force team offered some security predictions for new trends in the technology landscape and threats that are poised to emerge in 2018.
securityintelligence.webp 2017-12-13 13:06:06 Managing More Medical Images Than Ever? Learn How to Better Protect Them (lien direct) If not properly secured, many of the systems health care organizations use to store and share medical images could be exploited to expose patients' PHI. ★★★★★
securityintelligence.webp 2017-12-13 12:26:08 Checking It Twice: The Impact of the Time It Takes to Make Decisions About E-Commerce Fraud (lien direct) During the busy holiday shopping season, retailers must make decisions about e-commerce fraud rapidly to keep pace with demanding delivery schedules.
securityintelligence.webp 2017-12-13 12:06:05 The Benefits of Operational Risk Management (lien direct) Operational risk management can help organizations measure the cost of network security solutions versus the cost of a potential data breach.
securityintelligence.webp 2017-12-12 12:46:07 Does Your SIEM Need More Cowbell? (lien direct) IBM QRadar offers all the bells and whistles - and cowbell - security teams need to enhance their SIEM capabilities without paying an arm and a leg.
securityintelligence.webp 2017-12-11 13:01:05 \'Tis the Season for Increased Cybersecurity Vigilance (lien direct) Cybersecurity vigilance is crucial during the holiday shopping season, but it's equally important to carry that security awareness into the new year.
securityintelligence.webp 2017-12-11 12:36:03 Understanding the COSO 2017 Enterprise Risk Management Framework, Part 1: An Introduction (lien direct) The new COSO enterprise risk management framework offers business leaders a road map to more effectively assess, manage, review and report on cyber risks. Guideline
securityintelligence.webp 2017-12-11 11:46:03 Revisiting the Top Security Threats of 2017 (lien direct) Many of the security threats we noted at the start of 2017 gripped the public's attention during the past year, foreshadowing major shifts to come in 2018.
securityintelligence.webp 2017-12-08 13:01:05 Cybersecurity, Fraud and Operational Risk: The Time for Cognitive Convergence Is Now (lien direct) The threat landscape is expanding, and organizations must undergo a cognitive convergence to manage evolving security, fraud and operational risks.
securityintelligence.webp 2017-12-07 13:16:12 What Does Secure Digital Transformation Mean to You? (lien direct) A secure digital transformation requires open lines of communication and collaboration between line of business executives and security leaders. Guideline ★★
securityintelligence.webp 2017-12-07 12:46:06 When Legacy Tools Fail, Next-Generation Antivirus Solutions Can Defuse Endpoint Security Risks (lien direct) Legacy antivirus tools require more resources to operate and are less effective than next-generation solutions at defusing endpoint security risks.
securityintelligence.webp 2017-12-07 12:11:07 Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition (lien direct) At IRISSCON 2017, 48 contestants across 12 teams battled it out in a free-for-all CTF competition to test their hacking, defending and forensics skills.
securityintelligence.webp 2017-12-06 21:16:04 IBM Security Increases Its Leadership Position in the Gartner 2017 SIEM Magic Quadrant (lien direct) IBM Security was named a leader in Gartner's 2017 Magic Quadrant for SIEM, an honor that reflects IBM's continued commitment to innovation in the field. Guideline
securityintelligence.webp 2017-12-06 13:01:03 Naughty or Nice? Why the Total Cost of E-Commerce Fraud Is Worse Than You Think (lien direct) For retailers who are primarily concerned with minimizing chargebacks, the total cost of e-commerce fraud is worse than they realize. ★★★★
securityintelligence.webp 2017-12-06 11:01:04 Teaming Up to Overhaul Authentication (lien direct) IBM is partnering with leading authentication providers to make it easier to integrate new authentication technologies with IBM Security Access Manager. Guideline
Last update at: 2024-05-16 01:07:53
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter