Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2018-01-12 12:50:15 |
The High ROI of Cyberweapons: Five Factors Driving the Rise in Threats (lien direct) |
Due to their low barrier to entry, increasing availability and high return on investment, cyberweapons are becoming massively popular among threat actors.
|
|
|
|
|
2018-01-11 14:40:54 |
Identifying Named Pipe Impersonation and Other Malicious Privilege Escalation Techniques (lien direct) |
Security analysts can nip many cyberattacks in the bud by monitoring for named pipe impersonation and other activity indicative of privilege escalation.
|
|
|
|
|
2018-01-11 14:20:52 |
Four Key Lessons From NACD\'s \'2018 Governance Outlook\' About Managing Cyber Risks (lien direct) |
The National Association of Corporate Directors (NACD)'s "2018 Governance Outlook: Projections on Emerging Board Matters" offered key advice to help board directors engage with cyber risk management.
|
|
|
|
|
2018-01-10 14:45:35 |
Don\'t Get Scared - Get Back in Operation With the Right Incident Response Strategy (lien direct) |
For incident response teams, resuming normal operations in the wake of a cyberattack is the name of the game. However, lack of preparation and poor communication can impede recovery efforts.
|
|
|
|
|
2018-01-10 14:20:46 |
Multistep Authentication Is No Longer Enough for PCI Compliance (lien direct) |
To meet PCI compliance, organizations must implement multifactor authentication, as opposed to a multistep process, to protect the cardholder data environment from unauthorized access.
|
|
|
|
|
2018-01-09 18:05:14 |
Five Epic Fails in Data Security: Do You Know How to Avoid Them? (lien direct) |
By avoiding these common data security failures, organizations can protect their valuable assets from increasingly sophisticated cybercriminals and steer clear of the next major data breach.
|
|
|
|
|
2018-01-09 15:25:14 |
Where the CISO Should Sit on the Security Org Chart and Why It Matters (lien direct) |
The CISO's position on the security org chart influences the nature and frequency of interactions the security leader will have other executives - not to mention the security budget.
|
Guideline
|
|
|
|
2018-01-08 17:09:47 |
Six Major Data Breach Trends From 2017 (lien direct) |
The IBM X-Force team monitored major data breach trends throughout 2017 and gleaned key insights to help companies avoid headline-grabbing security incidents and protect sensitive data.
|
|
|
|
|
2018-01-08 16:06:40 |
Blockchain Exploits and Mining Attacks on the Rise as Cryptocurrency Prices Skyrocket (lien direct) |
As the value of bitcoin and other cryptocurrencies skyrockets, fraudsters are developing new blockchain exploits and mining schemes to get their cut of the digital gold rush.
|
|
|
|
|
2018-01-04 03:56:11 |
CPU Vulnerability Can Allow Attackers to Read Privileged Kernel Memory and Leak Data (lien direct) |
A newly discovered hardware vulnerability underscores a microprocessor flaw that could allow an attacker to read data from privileged kernel memory.
|
|
|
|
|
2018-01-03 13:36:21 |
The Enterprise Imperative: Five Tips for Improving Incident Response (lien direct) |
According to IBM's Christopher Scott, who spoke at The Wall Street Journal's Pro Cybersecurity Executive Forum, the road to better incident response is "a marathon, not a sprint."
|
|
|
|
|
2018-01-03 11:56:17 |
No Place For Passivity in Cybersecurity Leadership (lien direct) |
Many organizations lack the cybersecurity leadership required to effectively defend their networks and proactively respond to data breaches when they do occur.
|
Guideline
|
|
|
|
2018-01-02 12:01:17 |
Security\'s Time Management Crunch and How to Solve It (lien direct) |
It seems like there's never enough hours in the day for security professionals, but effective time management can positively impact your security posture in unimaginable ways.
|
|
|
|
|
2018-01-02 12:00:15 |
Five New Year\'s Resolutions to Help CISOs Improve Enterprise Security in 2018 (lien direct) |
CISOs can improve their enterprise security posture by adopting cognitive technology, educating executives, conducting incident response training and fostering a culture of security in 2018.
|
|
|
|
|
2017-12-29 13:05:09 |
Rinse, Wash, Repeat: Defining, Planning and Continuously Improving Your SIEM Strategy (lien direct) |
For security leaders, the process of defining an SIEM strategy is never complete. A successful deployment requires careful planning, regular review and a culture of continuous improvement.
|
Guideline
|
|
|
|
2017-12-29 12:35:10 |
Transform Your Security Strategy to Avoid Digital Roadblocks (lien direct) |
To transform your security strategy, you must first establish a model of shared responsibility between security professionals and business units throughout the organization.
|
|
|
|
|
2017-12-28 12:56:09 |
Take a Dive: Deep Network Insights for Deeper Analytics (lien direct) |
Security analysts need access to deep network insights in the form of user behavior analytics to unlock the full potential of technologies such as artificial intelligence and machine learning.
|
|
|
|
|
2017-12-28 12:36:09 |
ADS-B and Aviation Cybersecurity: Should Passengers Be Concerned? (lien direct) |
ADS-B technology supplements pilots' situational awareness and provides valuable weather data, but it remains to be seen whether it will impact aviation cybersecurity and passengers' data privacy.
|
|
|
|
|
2017-12-27 13:01:09 |
Long Road Ahead or Unbridgeable Chasm? Lessons From the EY \'Global Information Security Survey\' (lien direct) |
The EY "Global Infomation Security Survey" revealed that CISOs and executives have a long road ahead when it comes to improving communication - but it is indeed a road, not an unbridgeable chasm.
|
|
|
|
|
2017-12-22 12:31:08 |
The Past, Present and Future of DNS Security (lien direct) |
As the fabric of the internet evolves, security professionals must be aware of DNS security threats, such as DDoS attacks and schemes designed to direct users to malicious websites.
|
|
|
|
|
2017-12-22 12:21:09 |
Drowning in a Sea of Passwords? It\'s Time to Adopt a Password Manager (lien direct) |
A password manager enables users to access all their login credentials with a single master password, eliminating the need to juggle multiple credentials to access various accounts.
|
|
|
|
|
2017-12-21 13:11:11 |
BGP Internet Routing: What Are the Threats? (lien direct) |
The rate of BGP internet routing attacks has not increased significantly in the past two years. It is a considerable threat, however, because it puts the stability of the internet at risk.
|
|
|
|
|
2017-12-21 13:06:05 |
Closing ATM Network Security Gaps to Stop Fraudsters in Their Tracks (lien direct) |
Banks are already privy to the threat of physical breaches, but many remain unaware of the ATM network security gaps that could enable fraudsters to access their systems.
|
|
|
|
|
2017-12-20 09:41:08 |
Readying Your Security Operations for 2018 and Beyond (lien direct) |
If you are planning to launch a new deployment or otherwise expand your security operations center (SOC) in 2018, ensure that cognitive technologies are available to help analysts digest threat data.
|
|
|
|
|
2017-12-20 09:36:06 |
Year in Review: How Did the Cyberthreat Landscape Change in 2017? (lien direct) |
Over the course of 2017, the cyberthreat landscape shifted to accommodate a sharper focus on pure data destruction for the sake of disruption rather than monetary gain.
|
|
|
|
|
2017-12-19 13:16:08 |
Mark Your Calendar for the Top Security Conferences of 2018 (lien direct) |
Security conferences offer IT professionals and enthusiasts an opportunity to network with peers, learn from experts and browse emerging technologies.
|
|
|
|
|
2017-12-19 12:46:06 |
Data Risk Management: How to Put Executives in the Driver\'s Seat (lien direct) |
Executives are increasingly viewing data risk management as an area that can reduce costs and increase information security.
|
|
|
|
|
2017-12-19 12:21:05 |
Cybersecurity Skills Wanted: Investigative and Analytical Minds, Lifelong Learners, Protectors and Consultants (lien direct) |
To keep up with the growing shortage of cybersecurity skills, companies are looking to tap new sources of talent, such as students and new collar workers.
|
|
|
|
|
2017-12-18 13:26:05 |
The Data Security Forecast Calls for Zero Trust (lien direct) |
To successfully implement a zero trust architecture, security teams must invest in data security solutions that continuously monitor access in real time.
|
|
|
|
|
2017-12-18 12:26:13 |
Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges (lien direct) |
Organizations that follow both the COSO enterprise risk management framework and the NIST CSF can vastly improve their cyber risk oversight and management.
|
|
|
|
|
2017-12-18 12:16:06 |
Looking Ahead: Three Bold Cybersecurity Predictions for 2018 (lien direct) |
As we wrap up one of the wildest years the industry has ever seen, the IBM Resilient team offered three bold cybersecurity predictions for 2018.
|
|
|
|
|
2017-12-15 12:56:05 |
Things to Consider When Calculating the Return on Security Investment (lien direct) |
The return on security investment is a crucial calculation to help CISOs demonstrate risks in business terms and gain executive buy-in for security tools.
|
|
|
|
|
2017-12-15 12:26:08 |
Are You Prepared for Omnichannel Fraud? (lien direct) |
Omnichannel fraud has evolved to exploit the myriad technologies retailers have developed to enable consumers to purchase goods anytime, anywhere.
|
|
|
|
|
2017-12-14 13:16:03 |
Secure Your Business Silently With Unified Identity and Access Management (lien direct) |
Unified identity and access management solutions from IBM enable security teams to silently protect their networks without disrupting the user experience.
|
|
|
|
|
2017-12-14 12:51:06 |
From Waterfall to SecDevOps: The Evolution of Security Philosophy (lien direct) |
Unlike the waterfall and agile approaches to development, SecDevOps requires security to be built into projects from the outset, not bolted on afterward.
|
|
|
|
|
2017-12-14 12:01:05 |
New Year, New Threats: Five Security Predictions That Will Take Hold in 2018 (lien direct) |
The IBM Security X-Force team offered some security predictions for new trends in the technology landscape and threats that are poised to emerge in 2018.
|
|
|
|
|
2017-12-13 13:06:06 |
Managing More Medical Images Than Ever? Learn How to Better Protect Them (lien direct) |
If not properly secured, many of the systems health care organizations use to store and share medical images could be exploited to expose patients' PHI.
|
|
|
★★★★★
|
|
2017-12-13 12:26:08 |
Checking It Twice: The Impact of the Time It Takes to Make Decisions About E-Commerce Fraud (lien direct) |
During the busy holiday shopping season, retailers must make decisions about e-commerce fraud rapidly to keep pace with demanding delivery schedules.
|
|
|
|
|
2017-12-13 12:06:05 |
The Benefits of Operational Risk Management (lien direct) |
Operational risk management can help organizations measure the cost of network security solutions versus the cost of a potential data breach.
|
|
|
|
|
2017-12-12 12:46:07 |
Does Your SIEM Need More Cowbell? (lien direct) |
IBM QRadar offers all the bells and whistles - and cowbell - security teams need to enhance their SIEM capabilities without paying an arm and a leg.
|
|
|
|
|
2017-12-11 13:01:05 |
\'Tis the Season for Increased Cybersecurity Vigilance (lien direct) |
Cybersecurity vigilance is crucial during the holiday shopping season, but it's equally important to carry that security awareness into the new year.
|
|
|
|
|
2017-12-11 12:36:03 |
Understanding the COSO 2017 Enterprise Risk Management Framework, Part 1: An Introduction (lien direct) |
The new COSO enterprise risk management framework offers business leaders a road map to more effectively assess, manage, review and report on cyber risks.
|
Guideline
|
|
|
|
2017-12-11 11:46:03 |
Revisiting the Top Security Threats of 2017 (lien direct) |
Many of the security threats we noted at the start of 2017 gripped the public's attention during the past year, foreshadowing major shifts to come in 2018.
|
|
|
|
|
2017-12-08 13:01:05 |
Cybersecurity, Fraud and Operational Risk: The Time for Cognitive Convergence Is Now (lien direct) |
The threat landscape is expanding, and organizations must undergo a cognitive convergence to manage evolving security, fraud and operational risks.
|
|
|
|
|
2017-12-07 13:16:12 |
What Does Secure Digital Transformation Mean to You? (lien direct) |
A secure digital transformation requires open lines of communication and collaboration between line of business executives and security leaders.
|
Guideline
|
|
★★
|
|
2017-12-07 12:46:06 |
When Legacy Tools Fail, Next-Generation Antivirus Solutions Can Defuse Endpoint Security Risks (lien direct) |
Legacy antivirus tools require more resources to operate and are less effective than next-generation solutions at defusing endpoint security risks.
|
|
|
|
|
2017-12-07 12:11:07 |
Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition (lien direct) |
At IRISSCON 2017, 48 contestants across 12 teams battled it out in a free-for-all CTF competition to test their hacking, defending and forensics skills.
|
|
|
|
|
2017-12-06 21:16:04 |
IBM Security Increases Its Leadership Position in the Gartner 2017 SIEM Magic Quadrant (lien direct) |
IBM Security was named a leader in Gartner's 2017 Magic Quadrant for SIEM, an honor that reflects IBM's continued commitment to innovation in the field.
|
Guideline
|
|
|
|
2017-12-06 13:01:03 |
Naughty or Nice? Why the Total Cost of E-Commerce Fraud Is Worse Than You Think (lien direct) |
For retailers who are primarily concerned with minimizing chargebacks, the total cost of e-commerce fraud is worse than they realize.
|
|
|
★★★★
|
|
2017-12-06 11:01:04 |
Teaming Up to Overhaul Authentication (lien direct) |
IBM is partnering with leading authentication providers to make it easier to integrate new authentication technologies with IBM Security Access Manager.
|
Guideline
|
|
|