What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2020-06-29 09:00:06 These Cybersecurity Trends Could Get a Boost in 2020 (lien direct) The events of early 2020 have prompted organizations to shift priorities across the board, and security processes are no exception. While the current working environment has presented numerous short-term challenges, it has also caused security leaders to take a fresh look at what really matters to their businesses. The cybersecurity trends that emerge could ultimately […] Guideline
securityintelligence.webp 2020-06-03 13:01:29 How Cybersecurity Leaders Can Chart the Seas of Business Communication (lien direct) As organizations manage a variety of changes this year, cybersecurity leaders can serve as pillars of stability by keeping communication on track and on point. Guideline
securityintelligence.webp 2020-04-17 12:00:23 Defragging Security With a Platform Approach (lien direct) With cyberattacks at an all-time high, security leaders must strike a balance between comprehensive security and runaway complexity. This webinar discusses what a security platform can do to help. Guideline ★★★★
securityintelligence.webp 2020-02-07 14:01:28 What Leadership Qualities for CISOs Are Most Important in 2020? (lien direct) Leadership qualities for CISOs continue to evolve in the direction of what's being asked of top-level business executives. Guideline
securityintelligence.webp 2019-12-03 12:00:21 When Stalkerware Stalks the Enterprise (lien direct) Stalkerware is a real problem that can lead to individuals being tracked and stalked via software on their smartphones. It's also a growing and underappreciated threat to enterprises. Threat Guideline
securityintelligence.webp 2019-11-18 11:00:21 Change the Security Conversation to Help Advance Your Business (lien direct) By changing the cultural definition and conversation around security, business leaders can better reduce complexity in security ecosystems, orchestrate security responses and embrace open source. Guideline
securityintelligence.webp 2019-11-11 14:01:09 10 Differences Between Digital Transformation Leaders and Laggards (lien direct) Research shows that there are many differences between the best-of-class enterprises leading the way in digital transformation and their peers, who are falling behind. Guideline
securityintelligence.webp 2019-10-18 17:00:22 (Déjà vu) Identity Analytics and the \'2019 Gartner Magic Quadrant for Identity Governance and Administration\' (lien direct) IBM was named a Leader in the "2019 Gartner Magic Quadrant for Identity Governance and Administration" for its ability to execute and completeness of vision. Guideline
securityintelligence.webp 2019-08-28 12:00:02 The Business Case for Privileged Access Management (PAM) Goes Beyond Security and Compliance (lien direct) >Reading Time: 6 minutes Privileged access management is often seen as a necessary evil to improve security and compliance. However, PAM solutions offer myriad benefits that can help prove security ROI to business leaders. Guideline
securityintelligence.webp 2019-08-19 10:30:02 (Déjà vu) Context Becomes Key: The \'2019 Gartner Magic Quadrant for Access Management\' (lien direct) Reading Time: 4 minutes IBM was named a Leader in the "2019 Gartner Magic Quadrant for Access Management" for its ability to execute and completeness of vision. Guideline
securityintelligence.webp 2019-08-13 13:00:03 (Déjà vu) UEM\'s Sophomore Year: \'2019 Gartner Magic Quadrant for Unified Endpoint Management Tools\' (lien direct) Reading Time: 4 minutes IBM was named a Leader in the "2019 Gartner Magic Quadrant for Unified Endpoint Management" for its ability to execute and lead the entire field of vendors in its completeness of vision. Guideline
securityintelligence.webp 2019-08-12 11:30:02 What Is Security Intelligence? Here\'s What Your Business Leaders Want to Know (lien direct) Reading Time: 3 minutes How do you explain security intelligence to your COO? In today's heightened threat landscape, where business leaders are reading about breaches in the news every day, it's crucial to do your homework. Threat Guideline
securityintelligence.webp 2019-08-02 11:30:02 The Many Dimensions of Effective CISO Leaders (lien direct) >Reading Time: 5 minutes Does your CISO have the leadership and business qualities necessary to drive effective management of cyber risks? Let's explore four dimensions that CISOs must learn to master. Guideline
securityintelligence.webp 2019-07-24 11:00:02 5 IoT Security Conferences You Don\'t Want to Miss (lien direct) If you're a CISO, you should consider attending an IoT security conference to learn from the leaders in the field about how to integrate IoT security into your threat management program. Threat Guideline
securityintelligence.webp 2019-07-17 12:55:02 Enterprise Mobility Management Gets Personal (lien direct) >Enterprise mobility management (EMM) is widely adopted, but security leaders still struggle to enroll BYOD and other user-centric models. Guideline ★★★
securityintelligence.webp 2019-05-02 13:55:02 Exploring Ponemon Data: After 4 Years, Is Security Satiated With False Confidence? (lien direct) >The "2019 Ponemon Institute Study on the Cyber Resilient Organization" found that although security leaders are more confident in their cyber resilience, they are still overlooking critical areas. Guideline
securityintelligence.webp 2019-04-15 18:50:02 KuppingerCole Report: Leadership Compass of Access Management and Federation (lien direct) >IBM Security Access Manager (ISAM) is rated as a leader in the Product, Marketing and Technology Leadership categories in KuppingerCole's Leadership Compass report on access management and federation. Guideline
securityintelligence.webp 2019-04-04 12:00:02 Capture the Flag Competitions Can Help Close the Security Skills Gap (lien direct) >A capture the flag exercise gives security professionals and business leaders an opportunity to drill their cybersecurity response skills in a low-pressure yet highly engaging environment. Guideline
securityintelligence.webp 2019-03-29 11:00:02 A Busy IT Infrastructure Can Lead to Security Disaster (lien direct) >Smartphones, tablets and cloud computing have been leading the way in the workplace until now, but the growing popularity of the internet of things could totally change the look of IT infrastructure. Guideline
securityintelligence.webp 2019-03-26 12:30:02 How to Lift the Veil on Mobile Application Security Threats (lien direct) >Today's security leaders are tasked with complying with data privacy laws and enhancing user productivity while preserving their agility and securing them from mobile application security threats. Guideline
securityintelligence.webp 2019-03-25 16:40:02 Adopting the NIST 800-53 Control Framework? Learn More About the Anticipated Changes in 2019 (lien direct) >Organizations adopting NIST 800-53 should understand how upcoming changes will affect senior leadership accountability, data privacy and third-party assessments. Guideline
securityintelligence.webp 2019-03-01 13:00:02 Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics (lien direct) >By following the example of industry leaders with mature security analytics capabilities, less advanced organizations can improve SOC visibility and shift from reactive to proactive threat detection. Threat Guideline
securityintelligence.webp 2019-02-05 13:20:04 It\'s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare (lien direct) Cybersecurity industry leaders should define a new threat intelligence model that is three-dimensional, nonlinear, rooted in elementary number theory and that applies vector calculus. Threat Guideline
securityintelligence.webp 2019-02-04 12:45:03 Manage Emerging Cybersecurity Risks by Rallying Around Mutual Concerns (lien direct) >Chief information security officers (CISOs) are looking for ways to set the tone for the year and have more engaged conversations with top leadership regarding cybersecurity risks. Guideline
securityintelligence.webp 2019-01-30 14:35:02 How Fraud Specialist Danna Pelleg Fights Bad Guys With the Best Team in the Business (lien direct) >Danna Pelleg's childhood curiosity, early technology education and compulsion to fight the bad guys led her to a career as a fraud specialist and security operations team lead at IBM Trusteer. Guideline
securityintelligence.webp 2019-01-28 17:30:03 Social Engineering Training: Why Getting Hacked Is a Security Advantage (lien direct) >Social engineering and security awareness training exercises can help business leaders uncover gaps in their incident response plans and identify poor security hygiene among employees. Guideline
securityintelligence.webp 2019-01-24 13:45:03 As BYOD Adoption and Mobile Threats Increase, Can Enterprise Data Security Keep Up? (lien direct) >While most security professionals have come to embrace bring-your-own-device (BYOD) policies, leadership still often lacks confidence in the data security of employees' personal devices. Guideline
securityintelligence.webp 2019-01-23 14:00:04 How Former Bomb Disposal Expert and Lighting Designer Shaked Vax Pivoted Toward a Cybersecurity Career (lien direct) >Shaked Vax dismantles bombs and created light shows for rock stars before starting his cybersecurity career. Now he's leading IBM Trusteer's move into frictionless identity management. Guideline
securityintelligence.webp 2019-01-14 13:00:04 Protect Your Critical Assets in a Landscape of Expanding Attack Surfaces (lien direct) >Security leaders face more challenges to protect critical assets than ever. The evolving enterprise landscape has created a need for new frameworks and solutions to achieve visibility and control. Guideline
securityintelligence.webp 2019-01-10 14:30:02 How the Financial Services Industry Is Preparing to Avoid and Respond to Systemic Cyberattacks (lien direct) >Financial services industry leaders visited the IBM X-Force Command Cyber Range for a war game exercise designed to battle-test their response to a systemic cyberattack. Guideline
securityintelligence.webp 2019-01-07 12:55:02 Is It Time for Enterprises to Bid Farewell to BYOD? (lien direct) >As BYOD practices blur the boundary of the enterprise perimeter, how can security leaders ensure corporate data is safe? Guideline
securityintelligence.webp 2018-12-26 12:50:02 4 Ways to Overcome the Cyber Workforce Shortage (lien direct) >The supply/demand ratio for the cyber workforce is now about 2.3 skilled workers per job opening, according to NIST. Security leaders need to be more creative to fill the gaps in their teams. Guideline
securityintelligence.webp 2018-12-18 11:55:01 From Naughty to NICE: Best Practices for K–12 Cybersecurity Education (lien direct) >The National Institute for Cybersecurity Education is leading the charge in K–12 security awareness training. Guideline
securityintelligence.webp 2018-12-12 16:45:02 3 Security Business Benefits From a 2018 Gartner Magic Quadrant SIEM Leader (lien direct) >The main characteristics of a SIEM leader are centered around innovation in early threat detection, adaptation to customer environments and strong market presence. Threat Guideline ★★★
securityintelligence.webp 2018-12-07 15:35:01 How Tomer Agayev Fights Financial Fraud Through Curiosity, Suspicion and Education (lien direct) >As threat research team lead at Trusteer, Tomer guards the gateway to both known and unknown threats and passes along his insights to help banking customers protect themselves from social engineering. Threat Guideline
securityintelligence.webp 2018-12-05 12:40:01 How Can Government Security Teams Overcome Obstacles in IT Automation Deployment? (lien direct) >IT automation is the future of security programs, but it's not simply plug-and-play. SOC leaders must implement this technology thoughtfully to unlock the full range of benefits. Guideline
securityintelligence.webp 2018-11-26 12:20:03 How to Prepare for the Coming 5G Security Threats (lien direct) >5G communications networks will empower a future that some are calling the "Fourth Industrial Revolution" - but security leaders must prepare for the coming 5G security threats. Guideline
securityintelligence.webp 2018-11-21 14:00:02 The Forrester Wave: Unified Endpoint Management, Q4 2018 - New Acronyms, New Leaders and How Device Management Has Evolved (lien direct) >IBM was named a leader in the "2018 Forrester Wave: Unified Endpoint Management, Q4 2018" report, and MaaS360 earned recognition as the best current offering in the marketplace. Guideline
securityintelligence.webp 2018-11-14 12:05:01 How Can Industry Leaders and Academia Help Improve Cybersecurity Education? (lien direct) >It's up to security and educational leaders alike to improve and expand opportunities for cybersecurity education. Guideline
securityintelligence.webp 2018-11-05 13:05:02 3 Creative Strategies to Narrow the Skills Gap (lien direct) >The cybersecurity skills gap will continue to grow until executive leadership takes more creative steps to narrow it. Guideline
securityintelligence.webp 2018-10-31 11:30:01 How to Develop an Immersive Cybersecurity Simulation (lien direct) >A well-planned cybersecurity simulation can help the entire organization, from incident responders to top leadership, practice their crisis management skills in a low-stakes yet immersive environment. Guideline
securityintelligence.webp 2018-10-24 15:30:02 How can highly regulated industries achieve strong authentication via mobile devices? (lien direct) >In effort to secure sensitive data and protect critical assets, IT & Security leaders in highly regulated industries, including the US Federal government, mandate strong authentication tied to... Guideline
securityintelligence.webp 2018-10-23 12:05:01 6 Common Myths That Could Be Holding Back Your Cybersecurity Awareness Efforts (lien direct) >To improve the company's overall cyber resilience posture, security leaders must promote a culture of cybersecurity awareness from the top down. They can start by debunking these six common myths. Guideline
securityintelligence.webp 2018-10-17 13:00:02 5 Tips to Bring Colleagues on Board With Information Security Systems (lien direct) >The more employees and business leaders are involved with your information security systems, the more long-term buy-in you'll have when it comes to following security policies and best practices. Guideline
securityintelligence.webp 2018-10-17 11:15:01 Is Employee Negligence Threatening Your Information Security? (lien direct) >With a little education and a lot of communication, security leaders can steadily reduce employee negligence over time through consistent, comprehensive awareness training. Guideline
securityintelligence.webp 2018-10-08 12:30:02 Does Your SOC Have a Security Playbook? (lien direct) >By creating, regularly reviewing and maintaining a security playbook, SOC leaders can position analysts to execute incident response processes more quickly and effectively. Guideline
securityintelligence.webp 2018-10-04 12:20:02 How Nick Bradley Made a Career of Pursuing Bad Guys, From the Military to X-Force IRIS (lien direct) >X-Force IRIS Practice Lead Nick Bradley was on track for an illustrious career in the military police when a computer virus detoured his path towards protection of a different kind. Guideline ★★
securityintelligence.webp 2018-10-03 10:00:02 Visibility and Control: A One-Two Punch for Securing iOS Devices in the Enterprise (lien direct) >With many organizations now dependent on iOS devices, security leaders must balance productivity and security with the right endpoint management solution. Guideline
securityintelligence.webp 2018-09-28 11:55:01 How to Develop Next-Generation SOC Analysts, Part 1 (lien direct) >SOC analysts don't always come with all the certifications and skills an organization needs to protect its data. How can security leaders develop these employees into passionate, dedicated analysts? Guideline
securityintelligence.webp 2018-09-27 14:35:05 IBM Named a Leader in \'The Forrester Wave: Identity Management And Governance, Q3 2018\' (lien direct) In its latest report for identity management and governance, Forrester recognized IBM Security as a Leader. Guideline
Last update at: 2024-05-09 22:10:02
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter