What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2017-09-14 12:45:35 The New CISO: Management Through Thought Leadership (lien direct) The CISO can positively impact both organizational security and his or her own professional brand through thought leadership. Guideline
securityintelligence.webp 2017-09-11 12:11:56 CTRL-ALT-DELETE Before You Leave Your Seat! Security Awareness and Training Through Positive Reinforcement (lien direct) Security leaders should infuse positive reinforcement into their security awareness and training programs to encourage users to adopt best practices. Guideline
securityintelligence.webp 2017-09-05 12:20:29 The Security Leader\'s Expanding Role: Seven Priorities to Drive CISO Success (lien direct) Today's CISO needs to be more than just a security leader. The role now demands constant communication, continuous education and acute business sense. Guideline
securityintelligence.webp 2017-08-16 11:50:25 IDaaS Vendors: IBM Cloud Identity Service Named Market Leader in Six Recent Analyst Reports (lien direct) IBM Cloud Identity Service was named a leader in six recent industry reports, solidifying IBM's reputation as one of the industry's top IDaaS vendors. Guideline
securityintelligence.webp 2017-07-12 11:15:24 Outsider or Insider: Who Will Cause Today\'s Data Breach? (lien direct) Security leaders must defend sensitive enterprise information from both external actors and negligent insiders who might accidentally cause a data breach. Guideline
securityintelligence.webp 2017-07-11 12:00:32 The Promise of a Unified App Catalog for the Enterprise (lien direct) A unified app catalog can help IT leaders properly manage the mobile workforce and secure disparate applications running on different operating systems. Guideline ★★★★
securityintelligence.webp 2017-07-07 11:10:23 The Cybersecurity Skills Gap Is No Match for Cognitive Security (lien direct) Cognitive security tools enable SOC analysts to bridge gaps in intelligence, speed and accuracy, and empowers team leaders to address the IT skills gap. Guideline
securityintelligence.webp 2017-06-29 10:00:33 IBM Named a Leader in Inaugural Gartner Magic Quadrant for Access Management, Worldwide (lien direct) Gartner recognized IBM as a Leader for its completeness of vision and ability to execute in the first ever Magic Quadrant for Access Management, Worldwide. Guideline
securityintelligence.webp 2017-06-28 11:30:20 Four Ways CISOs Can Play a Key Role in Educating Top Leadership About Cyber Risks (lien direct) Security leaders must translate their technical expertise into business insights when communicating cyber risks to executives and board directors. Guideline
securityintelligence.webp 2017-06-14 11:46:20 Creating a Culture of Security Through Change Management (lien direct) Effective change management requires thorough planning, constant communication, and strong leadership capable of swaying the organizational culture. Guideline ★★★★
securityintelligence.webp 2017-06-13 11:31:18 Addressing Security Gaps in the Energy Industry (lien direct) To address security gaps in the energy industry, organizations must empower leaders to take full responsibility for cyberdefense and hold them accountable. Guideline
securityintelligence.webp 2017-06-12 11:36:14 Asleep at the Switches: Don\'t Let Cyber Fatigue Catch Your Enterprise Off Guard (lien direct) To combat cyber fatigue, security leaders must communicate the importance of password hygiene without diluting the message. Guideline
securityintelligence.webp 2017-06-08 16:51:22 IBM Picks Up Six: A Leader in 2017 Gartner Magic Quadrant for Enterprise Mobility Management (lien direct) IBM was named a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for the sixth consecutive year. Guideline
securityintelligence.webp 2017-06-05 13:01:16 Security Awareness: How to Make Your Weakest Link Part of Your Defense (lien direct) A well-aligned, orchestrated security awareness program can help IT leaders strengthen the weakest link in any security program: users. Guideline
securityintelligence.webp 2017-06-05 09:51:14 Embracing the GDPR as a Catalyst for Innovation (lien direct) Now is the time for security leaders to stop talking about the GDPR and start acting to achieve compliance before the law takes effect in May 2018. Guideline
securityintelligence.webp 2017-05-24 12:56:08 Don\'t Sit Back and Wait for Security Risks to Disappear (lien direct) Many IT leaders and executives simply accept security risks as a result of poor decisions based on fear, misinformation and flawed insights. Guideline
securityintelligence.webp 2017-05-24 12:01:13 Empower Your Employees to Become Security Awareness Champions (lien direct) Security leaders must tailor their security awareness training programs to the particular needs and goals of the employees in their departments. Guideline
securityintelligence.webp 2017-05-22 10:31:10 Cybersecurity Hiring Woes? Time to Consider a New Collar Approach (lien direct) IBM is leading an industrywide effort to close the IT skills gap by hiring new collar professionals who lack formal degrees but possess requisite skills. Guideline
securityintelligence.webp 2017-05-19 11:31:09 Traditional Approaches to User Security Training Are Creating Unnecessary Risks (lien direct) To make user security training more effective, IT leaders must engage employees with a more creative - and less boring - approach. Guideline
securityintelligence.webp 2017-05-09 13:01:07 Is the CISO Job Market Overcrowded? (lien direct) The CISO job market is full of qualified and underemployed security leaders champing at the bit to provide value to organizations. Guideline
securityintelligence.webp 2017-05-08 11:11:06 Cybersecurity Leadership in Transition: A View From the Classroom (lien direct) Cybersecurity leadership courses traditionally focus on imparting subject matter expertise, but the next generation of CISOs must also be trusted advisors. Guideline
securityintelligence.webp 2017-05-01 12:26:00 How to Become a Successful CISO (lien direct) A career as a CISO can be highly rewarding, but it's not all glitz and glamor. Security leaders must be tactful, strategic and communicative to succeed. Guideline
securityintelligence.webp 2017-04-05 12:25:52 Signs That You\'re About to Suffer a Security Breach (lien direct) Security leaders must communicate effectively with executives and monitor users for signs that the organization is about to suffer a security breach. Guideline
securityintelligence.webp 2017-04-04 11:55:52 Is the Security Community Out of Touch? (lien direct) Instead of waiting for industry giants to take the lead, the security community should encourage dialogue and collaborate to create a security framework. Guideline
securityintelligence.webp 2017-03-30 12:50:51 Do We Need to Worry About Shadow IT? (lien direct) Shadow IT is still a challenge for organizations. Security leaders should provide users with the tools they need and monitor unsanctioned use carefully. Guideline
securityintelligence.webp 2017-03-30 12:05:50 CISO Complexity: A Role More Daunting Than Ever (lien direct) Given the growing number of compliance requirements and advanced threats security leaders must deal with, CISO complexity is at an all-time high. Guideline
securityintelligence.webp 2017-03-22 12:55:46 Breaking Down Barriers to Information Security Progress (lien direct) Information security programs need to progress to meet the challenges of today and tomorrow, but it's not easy for leaders to overcome common barriers. Guideline
securityintelligence.webp 2017-03-22 11:10:48 Securing Your Cloud-Based Resources: Start With These Four Areas (lien direct) With cloud-based resources becoming an integral part of the enterprise, it's time for security leaders to recognize the best ways to protect these assets. Guideline
securityintelligence.webp 2017-03-17 13:10:48 Your Cybercriminal Has an Image Problem (lien direct) The classic image of the Hollywood hacker is misleading. The typical cybercriminal is more likely to be a state-sponsored actor or malicious insider. Guideline
securityintelligence.webp 2017-03-14 12:10:46 QRadar Waves From the Leader Position in the Forrester 2017 Security Analytics Wave (lien direct) IBM Security was recognized as a leader in the first ever Forrester Security Analytics Wave, earning the highest scores in solution strength and vision. Guideline
securityintelligence.webp 2017-03-13 12:55:44 The Enterprise Mobility Conundrum: How to Control the Data? (lien direct) Businesses can benefit from BYOD policies, but IT leaders must implement the right enterprise mobility solutions to protect their sensitive data. Guideline
securityintelligence.webp 2017-03-06 15:05:41 Building a Cybersecurity Culture Around Layer 8 (lien direct) IT leaders must develop a strong cybersecurity culture to promote awareness and accountability, and to empower employees to learn and develop. Guideline
securityintelligence.webp 2017-03-06 13:00:46 Closing Cloud Security Gaps at Every Step of the Migration Process (lien direct) When moving data and services to the cloud, IT leaders must implement cloud security measures at every step of the complex migration process. Guideline
securityintelligence.webp 2017-03-03 12:45:49 IBM Retains Leadership Position in 2017 Gartner Magic Quadrant for Application Security Testing (lien direct) In the most recent update to the Gartner Magic Quadrant for Application Security Testing report, IBM maintained its position in the "Leaders" Quadrant. Guideline
securityintelligence.webp 2017-02-27 13:00:45 IBM Is a Leader, Again, in the 2017 Gartner Magic Quadrant for IGA (lien direct) IBM Security was named a Leader in the recently published "2017 Gartner Magic Quadrant for IGA" for the third consecutive year. Guideline
securityintelligence.webp 2017-02-22 13:50:41 Time to End the Tension Between Corporate Remediation and Security Teams (lien direct) Although remediation and security teams are working toward a common goal, their conflicting priorities, culture and tools often lead to discord. Guideline
securityintelligence.webp 2017-02-22 13:00:44 The Disconnected Digital World (lien direct) As we continue our transformation into a digital world, IT leaders must find ways to resolve disconnects related to communication, policy, tools and more. Guideline
securityintelligence.webp 2017-02-22 11:45:40 Adaptive Security: The Safety Net in the Flying Trapeze Act (lien direct) IT leaders should use adaptive security solutions as a safety net to protect user, customer and corporate data from fraudsters. Guideline
securityintelligence.webp 2017-02-20 13:40:39 Shadow IT Comes of Age (lien direct) Harnessing shadow IT starts with security leaders. IT and security teams must work together to identify problem areas and provide quality solutions. Guideline
securityintelligence.webp 2017-02-16 12:05:37 CSOs Who Understand the User Experience Deliver Better Security (lien direct) A smooth user experience leads to more secure systems and databases. CSOs should consult users directly to resolve issues related to the data they access. Guideline
securityintelligence.webp 2017-02-14 12:35:36 Learn to Love Online Dating Security (lien direct) IT leaders must educate employees about online dating security to minimize the risks associated with the use of these services in the workplace. Guideline
securityintelligence.webp 2017-02-13 10:00:41 It\'s Time to Go Beyond Next-Generation Endpoint Security (lien direct) To protect the most vulnerable gateways into their networks, IT leaders must go beyond next-generation endpoint security with IBM BigFix Detect. Guideline
securityintelligence.webp 2017-02-02 12:30:37 Is IoT Security an Oxymoron? (lien direct) As the Internet of Things continues to expand, IT leaders must prepare accordingly or find themselves vulnerable to countless IoT security threats. Guideline
securityintelligence.webp 2017-02-01 15:30:36 Increased Regulatory Compliance Is Choking the CISO (lien direct) CISOs and other business leaders are struggling to maintain regulatory compliance as government agencies continue to devise new, complicated laws. Guideline
securityintelligence.webp 2017-02-01 14:05:43 IBM Named a Leader in 2016 Gartner Magic Quadrant for Managed Security Services (MSSP) (lien direct) IBM was named a Leader in the 2016 Gartner Magic Quadrant for Managed Security Services due in large part to positive testimonials from IBM clients. Guideline
securityintelligence.webp 2017-01-25 17:00:36 Crisis Leadership, Part 2: What Are We Learning? (lien direct) In addition to responding to threats in progress, crisis leadership involves rehearsing various responses to prepare for a data breach. Guideline
securityintelligence.webp 2017-01-23 15:00:35 IBM Plans to Acquire Agile 3 Solutions to Help Executives Manage Their Critical Data (lien direct) IBM recently announced its plan to acquire Agile 3 Solutions, a leader in business risk dashboarding and data visualization. Guideline
securityintelligence.webp 2017-01-23 13:00:36 An Evolving Threat: Ransomware in 2017 (lien direct) IT leaders must prepare to protect their environments from new types of ransomware in 2017, since the new year is sure to bring fresh threats. Guideline
securityintelligence.webp 2017-01-17 10:55:30 Know Your Security Loopholes to Outsmart Lurking Cyberthreats (lien direct) IT managers must know what types of data cybercriminals covet to close any security loopholes that might lead to a security breach. Guideline
securityintelligence.webp 2017-01-12 13:25:28 Charisma Killed the Cat: Fostering an Effective Cybersecurity Leadership Style (lien direct) Too much charisma can make for ineffective cybersecurity leadership. CISOs should encourage IT employees to challenge their policies and decision-making. Guideline
Last update at: 2024-05-10 01:07:50
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter