What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2017-12-05 18:36:02 The Evolution of the SIEM (lien direct) SIEM technology has evolved drastically over the past decade and will continue to mature as the threat landscape shifts and customers' needs change.
securityintelligence.webp 2017-12-05 15:26:05 IBM a Leader in \'The Forrester Wave: Enterprise Mobility Management, Q4 2017\' (lien direct) For the third straight time, IBM was recognized as a leader in "The Forrester Wave: Enterprise Mobility Management, Q4 2017" for its MaaS360 offering. Guideline
securityintelligence.webp 2017-12-05 12:51:03 Bringing Shadow IT Into the Security Light (lien direct) Shadow IT is created by employees accessing cloud services without prior approval, and it can be devastating to your enterprise's security posture.
securityintelligence.webp 2017-12-05 11:36:04 Infusing New Perspectives Into the Cybersecurity Workforce With a New Collar Approach (lien direct) A great way to bolster the dwindling cybersecurity workforce is to hire professionals who lack technical degrees but offer fresh perspectives.
securityintelligence.webp 2017-12-04 17:09:23 Loss Prevention Trends to Watch During the Holiday Shopping Season (lien direct) Physical theft accounted for two-thirds of inventory shrinkage in 2016, suggesting that retailers need to improve their loss prevention strategies.
securityintelligence.webp 2017-12-04 12:51:03 Let Silent Security Drive Your Identity and Access Management (lien direct) IBM Identity and Access Management (IAM) solutions deliver silent security, which enables analysts to protect your identity by monitoring behavioral data.
securityintelligence.webp 2017-12-04 10:15:59 Designing Your GDPR Plan: It\'s Time to Move From \'What\' to \'How\' (lien direct) After the Assess phase of your GDPR readiness journey, it's time to move onto the Design phase to determine how you'll achieve and maintain compliance.
securityintelligence.webp 2017-12-02 19:11:01 What\'s Behind the Rising Tide of Ransomware? (lien direct) The rate of ransomware is rising, largely due to the availability of exploit kits and ransomware-as-a-service (RaaS) packages in underground marketplaces.
securityintelligence.webp 2017-12-01 12:46:02 Improving Decision-Making in User Access Review and Cleanup Projects (lien direct) Machine learning algorithms can help security teams improve decision-making while conducting user access review and cleanup projects.
securityintelligence.webp 2017-11-30 13:21:08 The History and Reinvention of NAC (lien direct) Network access control (NAC) and enterprise networks themselves have come a long way in the past decade.
securityintelligence.webp 2017-11-30 12:41:02 The Case for Endpoint Detection and Response Tools: Why Traditional Protection Fails (lien direct) Following recent malware evolution, modern endpoint detection and response tools should not rely on just one trigger event, but on sophisticated logic.
securityintelligence.webp 2017-11-30 11:56:01 Securing Mobile Transactions and Payments in the Age of Connected Devices (lien direct) Simple security best practices can go a long way toward securing mobile transactions and payments for both consumers and service providers.
securityintelligence.webp 2017-11-29 13:01:03 Moving Target Defense: A Digital Shell Game (lien direct) Moving target defense constantly shifts the environment surrounding sensitive data, making it harder for would-be attackers to identify vulnerabilities.
securityintelligence.webp 2017-11-29 11:51:01 All Aboard! Applying the Security Immune System Approach to the Railroad Industry (lien direct) When it comes to protecting the railroad industry from cyberthreats, the security immune system approach can reduce incident triage from months to minutes.
securityintelligence.webp 2017-11-29 04:01:02 Three Steps to Secure Your AWS Environment Using IBM QRadar (lien direct) IBM QRadar can help you secure your AWS environment by checking for misconfigurations, monitoring for anomalous activity and curating content rules.
securityintelligence.webp 2017-11-28 16:06:00 Ursnif v3 Emerges, Targets Australian Bank Customers With Redirection Attacks (lien direct) A new cybergang operating a recent variant of the Ursnif Trojan has planted its flag in Australia, targeting banking customers with redirection attacks.
securityintelligence.webp 2017-11-28 12:51:03 Traveling This Holiday Season? Beware of RFID Attacks (lien direct) Consumers traveling during the holiday season should be aware of RFID attacks that could enable thieves to control their hotel key cards and digital locks.
securityintelligence.webp 2017-11-28 12:05:59 How Israel Became the Land of Connected Car Research and Development (lien direct) With its many manufacturer-sponsored test labs, smart car startups and military imperatives, Israel is becoming a major hub for connected car research.
securityintelligence.webp 2017-11-27 13:05:10 The \'Cracken\' in Action: A Password Cracking Adventure (lien direct) To maximize the horsepower of its password cracking system, the IBM X-Force team built its own hardware to aid in penetration testing efforts. ★★★★
securityintelligence.webp 2017-11-27 10:40:59 IoT Security: The Cold, Hard Truth About Digital Device Defense (lien direct) Is better digital device defense possible, or is securing the Internet of Things (IoT) an impossible task?
securityintelligence.webp 2017-11-27 10:25:59 Omnichannel Success Requires Retail Data Protections (lien direct) Omnichannel retailing is making shopping easier for consumers, but also presenting complexities to retailers.
securityintelligence.webp 2017-11-23 13:01:00 Innovation, Collaboration and Security Awareness: What We\'re Grateful for This Thanksgiving (lien direct) On this holiday, see what our contributors are thankful for in the world of cybersecurity, including improved security awareness and continued innovation.
securityintelligence.webp 2017-11-22 13:00:39 Cybersecurity Tips to Help Retailers and Consumers Stay Secure During the Holiday Season (lien direct) Consumers and retailers should implement these basic cybersecurity tips year-round to stay secure during the busy holiday shopping season.
securityintelligence.webp 2017-11-22 12:25:57 Aspects of Security We Need to Be Thankful For (lien direct) With the seemingly perpetual negativity surrounding security, there's still a lot to be thankful for and admire in today's environment.
securityintelligence.webp 2017-11-22 11:26:11 Canadian Business Banking Customers Hit With Targeted Phishing, Account Takeover Attacks (lien direct) A targeted phishing campaign aimed at Canadian businesses prompts users with high levels of access to divulge login credentials and authentication codes.
securityintelligence.webp 2017-11-21 13:15:57 Why Knock Innovation? SIEM Didn\'t Die - It Evolved (lien direct) SIEM has evolved from its comparatively humble beginnings to integrate user behavior analysis and log management capabilities that are critical to any SOC.
securityintelligence.webp 2017-11-21 12:40:59 Quit Your Day Job: Filling the Cybersecurity Skills Gap With Freelance Security Professionals (lien direct) Hiring freelancers can help companies close the cybersecurity skills gap, reduce overhead and infuse a fresh perspective into the organizational culture.
securityintelligence.webp 2017-11-21 12:05:56 \'Tis the Season for Retail Disruption (lien direct) Companies looking to minimize retail disruption during this holiday season should keep close tabs on emerging trends such as ransomware, the IoT and more. ★★★★
securityintelligence.webp 2017-11-20 13:11:04 Don\'t Let Network Complexity Tangle Up Your Security Strategy (lien direct) Overwhelmed network managers can significantly reduce network complexity by using automation in tandem with a well-defined policy.
securityintelligence.webp 2017-11-20 12:26:00 Wireless Security Lessons From the WPA2 Vulnerability (lien direct) One of the biggest WPA2 vulnerability wireless security lessons: Few people are aware, fewer know how to patch it and fewer still will do so.
securityintelligence.webp 2017-11-20 11:45:58 Take a Load Off: Delegate Cyber Risk Management Using the Three Lines of Defense Model (lien direct) The Three Lines of Defense model enables board directors to be involved in the cyber risk management process without micromanaging the security team.
securityintelligence.webp 2017-11-17 13:05:56 Why I Became an E-Resident of Estonia (lien direct) Estonia is leading the way in digital innovation, providing smart ID cards to its citizens to vote and interact with other public services. Guideline
securityintelligence.webp 2017-11-17 12:30:57 Fileless Malware Prompts Evolution of Endpoint Defenses (lien direct) A new generation of fileless malware has emerged, taking advantage of dynamic environments and prompting the need for more advanced defenses. ★★★★
securityintelligence.webp 2017-11-16 13:10:58 Steganography: A Safe Haven for Malware (lien direct) Steganography continues to be an incredibly versatile and effective method for obscuring or hiding information in plain sight.
securityintelligence.webp 2017-11-16 13:05:55 What to Know About the 2017 Gartner IAM Summit (lien direct) Looking forward to this year's Gartner IAM Summit in Las Vegas? Here's what you need to know to make the most of this conference.
securityintelligence.webp 2017-11-16 11:00:56 New Quad9 DNS Service Makes the Internet Safer and More Private (lien direct) Quad9 goes far beyond standard DNS name resolution to improve privacy, security scalability and ease of use.
securityintelligence.webp 2017-11-15 14:45:58 Software-Defined Security With SD-WAN (lien direct) It's no wonder organizations are embracing SD-WAN, which abstracts various connectivity options to provide a virtualized enterprise WAN.
securityintelligence.webp 2017-11-15 13:01:18 Don\'t Let a Retail Vulnerability Cause Holiday Havoc (lien direct) Stores and vendors must make sure they are minimizing the risk of a retail vulnerability ruining the holiday season.
securityintelligence.webp 2017-11-15 12:50:56 Data Storage and Encryption Should Top the CISO\'s To-Do List (lien direct) Before diving head-first into a data storage and encryption strategy, the CISO must decide which solutions best address the organization's unique needs.
securityintelligence.webp 2017-11-14 13:00:57 How Are ATMs Exploited? An Update on ATM Malware Methods (lien direct) ATM malware has evolved significantly in three years. ★★★★★
securityintelligence.webp 2017-11-14 12:50:55 Addressing Common Vulnerabilities and Security Gaps in the Oil and Gas Industry (lien direct) To close common security gaps in the oil and gas industry, IT leaders should educate employees, better manage remote devices and eschew standard products. Guideline
securityintelligence.webp 2017-11-14 12:40:58 Evolving Cloud-Native Applications Require New Best Practices (lien direct) As cloud-native applications become faster and more flexible, the security solutions that protect these applications must take on the same characteristics.
securityintelligence.webp 2017-11-13 15:01:22 The Ugly Duckling\'s Security Testing Transformation (lien direct) Some are wary of the Ugly Duckling due to his advanced hacking abilities, but when it comes to security testing, he's really one of the good guys. ★★
securityintelligence.webp 2017-11-13 14:55:08 The Grasshopper, the Ants and the Incident Response Plan (lien direct) The passive Grasshopper should be more like the Ants, who use IBM Resilient to support their robust and comprehensive incident response plan.
securityintelligence.webp 2017-11-13 11:01:06 New Banking Trojan IcedID Discovered by IBM X-Force Research (lien direct) IBM X-Force identified a new Trojan, dubbed IcedID, that uses advanced browser manipulation tactics to target financial institutions in the U.S. and U.K.
securityintelligence.webp 2017-11-10 13:15:54 IBM Leverages Retired Military Cybersecurity Expertise (lien direct) IBM is embracing the idea that retired military personnel can help fill the cyber skills gap and serve as leaders in the security industry. Guideline
securityintelligence.webp 2017-11-10 12:30:55 Boots on the Ground: New Collar Careers Bring Military Veterans to the Cybersecurity Battlefield (lien direct) Military veterans are prime candidates for new collar careers in cybersecurity because leadership and incident response are built into their training. Guideline
securityintelligence.webp 2017-11-09 13:10:56 Don\'t Worry About the KRACK Vulnerability - Just Create a Team of Superheroes! (lien direct) There is no silver bullet to thwart the KRACK vulnerability, but a security intelligence platform can help analysts become security superheroes.
securityintelligence.webp 2017-11-09 12:45:56 Overcoming Common Roadblocks on Your Digital Transformation Journey (lien direct) Companies that impact cultural change, keep their systems up to date and retain cyber talent have a leg up when it comes to digital transformation. ★★
securityintelligence.webp 2017-11-09 12:35:58 Making the Case for Containment With WIP (lien direct) When integrated with a UEM solution by default, Windows Information Protection (WIP) acts as its own container and maintains a native user experience.
Last update at: 2024-05-16 12:07:56
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter