What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2018-08-28 11:55:04 3 Key Areas of Security Operations to Benchmark and Evaluate (lien direct) >SOC leaders should benchmark against speed, intelligence and accuracy to effectively measure and, ultimately, improve their security operations workflow. Guideline
securityintelligence.webp 2018-08-14 11:08:01 How Mike Barcomb\'s Military Mindset Enhances Incident Response (lien direct) IBMer Mike Barcomb draws upon his experience in the U.S. Army Reserve to lead a team of incident response experts through careful planning, regular rehearsals and quick decision-making. Guideline
securityintelligence.webp 2018-07-31 16:16:00 How to Become an Articulate Leader and CISO in Five Steps (lien direct) >When a CISO is also an articulate leader, he or she can teach the company at large why cybersecurity is essential to business interests and motivate stronger coordination to achieve goals. Guideline
securityintelligence.webp 2018-07-26 14:25:05 (Déjà vu) Gartner Releases First-Ever Magic Quadrant for Unified Endpoint Management (UEM) (lien direct) >IBM was named a leader in the 2018 Magic Quadrant for Unified Endpoint Management Tools report for its completeness of vision and ability to execute. Guideline
securityintelligence.webp 2018-07-12 12:25:04 Understanding SIEM Technology: How to Add Value to Your Security Intelligence Implementation (lien direct) >As the threat landscape expands - and IT skills grow increasingly scarce - many security leaders don't know how to get the most out of their security information and event management (SIEM) solution. Threat Guideline
securityintelligence.webp 2018-07-11 10:20:04 The GDPR Evolution: A Letter to the CISO (lien direct) >To keep GDPR compliance efforts on track, security leaders must collaborate across departments, invest in robust tools and services and adopt a risk-based approach to handling customer data. Guideline
securityintelligence.webp 2018-07-09 11:30:04 How to Get Directors On Board With Cyber Risk Governance (lien direct) >The latest report from the DCRO urged top leadership to become more engaged in cyber risk governance and to hold all departments - not just IT - accountable for proper security hygiene. Guideline
securityintelligence.webp 2018-07-06 13:25:04 What\'s the Best Strategy to Manage Application Security Risk? (lien direct) To protect their organizations from threat actors targeting software vulnerabilities, security leaders should adopt an integrated approach to application security risk management. Threat Guideline
securityintelligence.webp 2018-07-03 12:05:03 Why UEM Is the New MDM: The Latest Stage in Enterprise Evolution (lien direct) >In addition to protecting laptops, smartphones, tablets and IoT devices, AI-powered UEM solutions can help security leaders manage apps, content, data and user identity and access more efficiently. Guideline
securityintelligence.webp 2018-06-25 18:30:03 (Déjà vu) IBM Named a Leader Again in the 2018 Gartner Magic Quadrant for Access Management, Worldwide (lien direct) >For the second consecutive year, Gartner has named IBM a leader in its Magic Quadrant for Access Management, Worldwide report, validating its leadership in identity-as-a-service (IDaaS). Guideline
securityintelligence.webp 2018-06-20 11:15:02 How to Recognize a Business Email Compromise Attack (lien direct) >Security leaders must implement phishing awareness programs to train employees to recognize business email compromise (BEC) attacks and other social engineering schemes that could compromise data. Guideline ★★★★★
securityintelligence.webp 2018-06-14 11:55:01 Can a Mature Bug Bounty Program Help Solve the Security Talent Shortage? (lien direct) >With a well-planned, mature bug bounty program, security leaders can lessen the impact of the security talent shortage by tapping the white-hat hacker community. Guideline
securityintelligence.webp 2018-05-30 13:39:02 The Inadvertent Insider Threat: A CISO Confronts a Breach From Within (lien direct) >Human error, credential misuse and disgruntled employees aren't the most common threats security leaders have to face - but the complexities of these incidents make insider threats the stuff of CISO nightmares. Guideline
securityintelligence.webp 2018-05-23 12:02:02 IBM Named a Leader in the 2018 Gartner Magic Quadrant for Managed Security Services (lien direct) >Last year was another significant and transformational period for IBM Security, as it was named a leader in the 2018 Gartner Magic Quadrant for Managed Security Services for the fifth year in a row. Guideline ★★
securityintelligence.webp 2018-05-15 12:07:01 Best Practices for Designing a Security Operations Center (lien direct) >Designing a security operations center (SOC) is not as simple as setting and forgetting an SIEM solution. Security leaders must consider human factors, business needs, budgetary constraints and more. Guideline
securityintelligence.webp 2018-05-09 12:22:01 Risk Acceptance 101: What Happens When Security Needs Go Unfunded? (lien direct) >The refusal of top leadership to fund security initiatives often translates to explicit, willful risk acceptance. Guideline ★★★★★
securityintelligence.webp 2018-05-03 18:43:00 Debate Club: Comparing the Merits of Enterprise Mobility Management and Client Management Tools (lien direct) >For IT and security leaders, the ability to manage devices, apps and content are critical to end-user productivity and the protection of corporate information. There are two popular methods for doing this across smartphones, tablets, laptops and servers. For mobile devices, the technology is most commonly referred to as enterprise mobility management (EMM). For laptops, […] Guideline
securityintelligence.webp 2018-04-30 11:46:05 When It Comes to Cyber Risks, Your Leadership Cannot Afford a Failure of Imagination (lien direct) >A failure of imagination could cause business leaders fail to account for predictable cyber risks due to a misperception of the company's incident response capabilities and cyber resilience posture. Guideline
securityintelligence.webp 2018-04-25 12:01:05 Protecting Your Employees\' Home IT From Cyberthreats (lien direct) Helping employees protect their home IT reduces enterprise security risks and helps security leaders better safeguard corporate data. Guideline
securityintelligence.webp 2018-04-20 13:07:02 Women in Security: Perspectives on Inclusion, Issues and Progress From the RSA Conference 2018 (lien direct) >At the RSA Conference 2018, industry leaders gathered to discuss issues surrounding women in security, including the key role of female IT professionals in closing the cybersecurity skills gap. Guideline
securityintelligence.webp 2018-04-11 13:27:01 It\'s Time to Bring Cloud Environments Out of the Shadows (lien direct) Business leaders often rush to migrate corporate assets to cloud environments to boost productivity and lower costs, but adopting cloud services without proper oversight can put data at risk. Guideline
securityintelligence.webp 2018-04-10 11:36:03 10 Takeaways From the ISO 31000:2018 Risk Management Guidelines (lien direct) >The International Standards Organization (ISO) released an updated version of its risk management guidelines to help security leaders engage top leadership in cyber risk decision-making. Guideline
securityintelligence.webp 2018-03-29 12:11:04 Failure to Communicate Critical Data Risk to Business Leaders Can Have Perilous Consequences (lien direct) >To avoid the disastrous consequences of a breach, security professionals must be able to effectively communicate critical data risk in a language business leaders can understand. Guideline
securityintelligence.webp 2018-03-28 12:51:02 Putting the \'I\' in CISO: Why the Security Leader Must Become an Influencer (lien direct) To become an influencer within his or her organization, the security leader must effectively communicate with lines of business, engage with the board - and avoid abusing his or her veto power. Guideline
securityintelligence.webp 2018-03-26 14:07:03 IBM Sustains a Leadership Position in 2018 Gartner Magic Quadrant for Application Security Testing (lien direct) IBM sustained its position in the "Leaders" Quadrant in the 2018 Gartner Magic Quadrant for Application Security Testing, which spanned 12 total vendors. Guideline
securityintelligence.webp 2018-03-12 11:56:00 Implementing O&A: Why Intelligence Is the Key to Strategic Orchestration (lien direct) By implementing orchestration and automation (O&A), security leaders can deliver the real-time threat intelligence their understaffed analyst teams need to punch above their weight. Guideline ★★
securityintelligence.webp 2018-02-26 12:50:05 (Déjà vu) IBM, a Leader Again in the 2018 Gartner Magic Quadrant for IGA (lien direct) IBM was recently named a Leader, again, in Gartner's 2018 Magic Quadrant for Identity Governance and Administration (IGA). Guideline
securityintelligence.webp 2018-02-23 13:25:04 Listen to Your Cassandras to Avoid Cybersecurity Disasters (lien direct) Instead of dismissing experts who warn of impending cybersecurity disasters, business leaders should thoroughly investigate the issue at hand and prepare a response to minimize the potential damage. Guideline
securityintelligence.webp 2018-02-08 12:00:34 In 2018, Security-as-a-Service Is Where It\'s At (lien direct) Security leaders are increasingly turning to security-as-a-service (SECaaS) to keep up with rapidly evolving threats and address the growing skills shortage. Guideline
securityintelligence.webp 2018-02-06 12:10:34 The Expanding Role of the CISO: Seven Attributes of a Successful Security Leader (lien direct) The role of the security leader is expanding, and CISOs must posses strong communication skills, extensive technical knowledge, analytical minds and the respect of their peers to be successful. Guideline
securityintelligence.webp 2018-02-02 13:00:26 Android Device Management: Sweet Features, No Toothache (lien direct) Android device management doesn't need to be difficult, as long as security leaders consider the privacy needs of the organization, IT department and user population before rolling out a UEM solution. Guideline
securityintelligence.webp 2018-01-09 15:25:14 Where the CISO Should Sit on the Security Org Chart and Why It Matters (lien direct) The CISO's position on the security org chart influences the nature and frequency of interactions the security leader will have other executives - not to mention the security budget. Guideline
securityintelligence.webp 2018-01-03 11:56:17 No Place For Passivity in Cybersecurity Leadership (lien direct) Many organizations lack the cybersecurity leadership required to effectively defend their networks and proactively respond to data breaches when they do occur. Guideline
securityintelligence.webp 2017-12-29 13:05:09 Rinse, Wash, Repeat: Defining, Planning and Continuously Improving Your SIEM Strategy (lien direct) For security leaders, the process of defining an SIEM strategy is never complete. A successful deployment requires careful planning, regular review and a culture of continuous improvement. Guideline
securityintelligence.webp 2017-12-11 12:36:03 Understanding the COSO 2017 Enterprise Risk Management Framework, Part 1: An Introduction (lien direct) The new COSO enterprise risk management framework offers business leaders a road map to more effectively assess, manage, review and report on cyber risks. Guideline
securityintelligence.webp 2017-12-07 13:16:12 What Does Secure Digital Transformation Mean to You? (lien direct) A secure digital transformation requires open lines of communication and collaboration between line of business executives and security leaders. Guideline ★★
securityintelligence.webp 2017-12-06 21:16:04 IBM Security Increases Its Leadership Position in the Gartner 2017 SIEM Magic Quadrant (lien direct) IBM Security was named a leader in Gartner's 2017 Magic Quadrant for SIEM, an honor that reflects IBM's continued commitment to innovation in the field. Guideline
securityintelligence.webp 2017-12-06 11:01:04 Teaming Up to Overhaul Authentication (lien direct) IBM is partnering with leading authentication providers to make it easier to integrate new authentication technologies with IBM Security Access Manager. Guideline
securityintelligence.webp 2017-12-05 15:26:05 IBM a Leader in \'The Forrester Wave: Enterprise Mobility Management, Q4 2017\' (lien direct) For the third straight time, IBM was recognized as a leader in "The Forrester Wave: Enterprise Mobility Management, Q4 2017" for its MaaS360 offering. Guideline
securityintelligence.webp 2017-11-17 13:05:56 Why I Became an E-Resident of Estonia (lien direct) Estonia is leading the way in digital innovation, providing smart ID cards to its citizens to vote and interact with other public services. Guideline
securityintelligence.webp 2017-11-14 12:50:55 Addressing Common Vulnerabilities and Security Gaps in the Oil and Gas Industry (lien direct) To close common security gaps in the oil and gas industry, IT leaders should educate employees, better manage remote devices and eschew standard products. Guideline
securityintelligence.webp 2017-11-10 13:15:54 IBM Leverages Retired Military Cybersecurity Expertise (lien direct) IBM is embracing the idea that retired military personnel can help fill the cyber skills gap and serve as leaders in the security industry. Guideline
securityintelligence.webp 2017-11-10 12:30:55 Boots on the Ground: New Collar Careers Bring Military Veterans to the Cybersecurity Battlefield (lien direct) Military veterans are prime candidates for new collar careers in cybersecurity because leadership and incident response are built into their training. Guideline
securityintelligence.webp 2017-11-01 11:15:51 CIAM Vendors Report: IBM Cloud Identity Service Named Market Leader in Consumer IAM Leadership Compass (lien direct) IBM Cloud Identity Service was named a Market Leader among CIAM vendors in the most recent IAM Leadership Compass. Guideline
securityintelligence.webp 2017-10-19 11:30:49 Your Security Awareness Program Stinks. Here\'s Something You Can Do About It (lien direct) IT leaders should eschew traditional, dry security awareness training materials for entertaining content that encourages stronger user engagement. Guideline
securityintelligence.webp 2017-10-16 12:00:49 Make Security Culture Your Top Priority (lien direct) An organization can have all the technology and expertise money can buy, but a poor security culture can still lead to devastating data breaches. Guideline
securityintelligence.webp 2017-10-10 11:55:46 The \'Cracken\': The Evolution of Password Cracking (lien direct) IBM X-Force Red is leading the way in the field of password cracking with the Cracken, a tool designed to help companies improve password hygiene. Guideline
securityintelligence.webp 2017-09-26 11:45:39 Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges (lien direct) Security leaders in the health care, financial services, and energy and utilities sectors must pay special attention to industry-specific security risks. Guideline
securityintelligence.webp 2017-09-20 12:01:03 IBM Named a Leader in Latest IDC Worldwide MarketScape (lien direct) IBM was named a leader in the "IDC MarketScape: Worldwide Managed Security Services 2017 Vendor Assessment" for its ability to integrate MSS globally. Guideline
securityintelligence.webp 2017-09-15 10:50:09 Increased Awareness Is the Best Cure for Health Care Security Risks (lien direct) Many health care security risks stem from insufficient leadership and limited resources, which can often be attributed to a lack of security awareness. Guideline
Last update at: 2024-05-09 20:07:54
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter