What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2017-01-11 12:50:28 Don\'t Let Remote Management Software Contribute to Building Botnets (lien direct) IT leaders must be vigilant when using remote management software. Attackers can exploit these tools to infect devices with malware and build botnets. Guideline
securityintelligence.webp 2017-01-02 11:10:27 2017: A New Year\'s Security Resolution (lien direct) IT leaders should make a security resolution to improve basic hygiene, back up data regularly and share threat information to fight cybercrime in 2017. Guideline
securityintelligence.webp 2016-12-21 11:30:24 Adopting PaaS: Tips and Best Practices for Cloud Transformation (lien direct) When adopting PaaS solutions, IT leaders must consider the many security concerns that arise when data is stored and shared using cloud services. Guideline
securityintelligence.webp 2016-12-14 13:50:21 Five Signs of CISO Complacency (lien direct) CISO complacency can lead to anxiety and ambiguity, which can erode team morale and cause IT departments to miss important details with no accountability. Guideline
securityintelligence.webp 2016-12-06 12:40:18 Real-Time Payments, Real-Time Fraud Risks? (lien direct) Programs such as NACHA's Faster Payments initiative may help U.S. businesses become more competitive, but shorter transaction times lead to fraud risks. Guideline
securityintelligence.webp 2016-11-29 12:10:18 Cognitive Security Key to Addressing Intelligence and Accuracy Gaps (lien direct) Cybersecurity leaders hope to use cognitive security solutions to improve detection and incident response capabilities and reduce false positives. Guideline
securityintelligence.webp 2016-11-23 12:30:16 IT and Business Leaders Collaborate to Protect Critical Data (lien direct) It takes a collaborative effort between IT and business leaders to protect critical data from cybercriminals and sustain a competitive advantage. Guideline
securityintelligence.webp 2016-11-16 16:00:34 Crisis Leadership: The Missing Link in Cyberattack Defense (lien direct) C-suite executives often lack the experience and training required to establish and lead a successful cyberattack defense program. Guideline
securityintelligence.webp 2016-10-28 12:46:24 Questions Every CIO Should Ask the Cybersecurity Leader: Part 3 (lien direct) The cybersecurity leader and CIO must collaboratively address 10 common risk management controls to protect the organization's most sensitive data. Guideline
securityintelligence.webp 2016-10-25 11:14:50 The Role of the CISO and Information Security in the Construction Industry (lien direct) Many companies fail to recognize the importance of information security in the construction industry. A CISO or CIO is critical to lead security efforts. Guideline
securityintelligence.webp 2016-10-25 09:52:02 Global City CIOs Launch New Organization to Promote Best Smart City Practices (lien direct) A group of IT leaders from around the world formed the Council of Global City CIOs to promote information sharing when it comes to smart city initiatives. Guideline
securityintelligence.webp 2016-10-24 12:50:21 Learn How to Protect Yourself From Yourself With Identity Governance and Intelligence (lien direct) An effective identity governance and intelligence solution enables IT leaders to manage and monitor the levels of access granted to each individual user. Guideline
securityintelligence.webp 2016-10-21 12:56:03 Questions Every CIO Should Ask the Cybersecurity Leader: Part 2 (lien direct) When it comes to building a secure IT program, the CIO must ask the cybersecurity leader the right questions to devise an effective incident response plan. Guideline
securityintelligence.webp 2016-10-14 12:43:55 Questions Every CIO Should Ask the Cybersecurity Leader: Part 1 (lien direct) Many organizations lack an efficient risk prioritization strategy. A healthy transformation requires cooperation between the CIO and cybersecurity leader. Guideline ★★
securityintelligence.webp 2016-10-07 12:56:43 ASN.1 Compiler Causes a Network Vulnerability (lien direct) Researchers discovered a flaw in the ASN1C compiler produced by Objective Systems, Inc. It could lead to a dangerous network vulnerability. Guideline
securityintelligence.webp 2016-10-07 12:54:33 National Cyber Security Awareness Month: Attestations and Certifications (lien direct) This National Cyber Security Awareness Month, security leaders should examine their IT environments with respect to SSAE-16 and ISO 27001 standards. Guideline
securityintelligence.webp 2016-09-30 13:25:16 Pros and Cons of Building and Maintaining In-House Pen Testing Capability (lien direct) Security leaders must weigh the convenience and speed of in-house pen testing against the cost of maintaining a team to conduct security tests. Guideline
securityintelligence.webp 2016-09-12 14:50:15 The CASB Knows: Lifting the Cloud App Visibility Fog (lien direct) A cloud access security broker (CASB) can help security leaders manage the use of cloud-based apps to benefit both the enterprise and its employees. Guideline
securityintelligence.webp 2016-09-08 14:00:29 IBM Named a Leader in 2016 Forrester Wave for Managed Security Services (lien direct) IBM Security is among those that lead the pack in a recent assessment of 11 providers in "The Forrester Wave for Managed Security Services, Q3 2016." Guideline
securityintelligence.webp 2016-09-05 13:25:28 Why Should Women in Security Shoot for the Stars? (lien direct) In response to the dearth of women in security, IBM is leading an industrywide push to encourage and enable women to pursue cybersecurity careers. Guideline
securityintelligence.webp 2016-08-29 11:00:25 Five Signs of Identity Governance Trouble (lien direct) Security leaders can manage their organization's risk by identifying and remediating identity governance trouble before it leads to a damaging data breach. Guideline
securityintelligence.webp 2016-08-26 11:35:23 Security Conferences Abound: Which Should You Attend? (lien direct) Security leaders, professionals and operational business leaders all stand to benefit from the myriad security conferences being held in 2017. Guideline
securityintelligence.webp 2016-08-22 15:00:25 Innovation Fuels IBM QRadar Leadership (Again) in Gartner\'s 2016 Magic Quadrant for SIEM (lien direct) IBM QRadar is a leader again in the 2016 Gartner Magic Quadrant for SIEM, further cementing its reputation as a top security solution. Guideline
securityintelligence.webp 2016-07-12 11:51:15 The Information Security Leader, Part 2: Two Distinct Roles of a CISO (lien direct) Information security leaders today must be able to fill the two distinct roles of a CISO: the subject-matter expert and the trusted business adviser. Guideline
securityintelligence.webp 2016-07-07 09:36:10 After the Brexit: Three New Challenges Facing European Security Leaders (lien direct) Now that the U.K. has voted in favor of the Brexit, security leaders across Europe will have to handle a few new challenges stemming from the move. Guideline
securityintelligence.webp 2016-07-05 12:56:08 The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges (lien direct) An information security leader today needs to fill multiple roles and be capable of addressing new challenges related to managing risk. Guideline
securityintelligence.webp 2016-06-03 10:21:03 Inside the Mind of a Hacker: Attacking the Memory (lien direct) A savvy hacker may identify vulnerabilities that lead to memory attacks. Learn what contributes to these issues and best practices for avoiding them. Guideline
securityintelligence.webp 2016-05-03 18:55:50 Bank Teller or Robber? Analytics, Predictive Insight and Agility Can Stop Data Breaches Before They Begin (lien direct) Are insiders leading to data breaches within your organization? The right security tools and analytics can help you find out — and prevent these incidents. Guideline
securityintelligence.webp 2016-04-27 10:05:49 Engaging Conversations Key to Improving Cyber Risk Decisions (lien direct) C-level executives, boards of directors and security leadership need to have engaging conversations to make better cyber risk decisions for the business. Guideline
Last update at: 2024-05-10 16:08:04
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter