What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
InfosecIsland.webp 2021-03-08 19:11:40 Intel Corp. to Speak at SecurityWeek Supply Chain Security Summit (lien direct) Join Intel on Wednesday, March 10, at SecurityWeek's Supply Chain Security Summit, where industry leaders will examine the current state of supply chain attacks. Hear Intel's experts discuss the need for transparency and integrity across the complete product lifecycle, from build to retire. Guideline
InfosecIsland.webp 2019-10-23 05:17:00 Artificial Intelligence: The Next Frontier in Information Security (lien direct) The hype can lead to confusion and skepticism over what AI actually is and what it really means for business and security. Guideline
InfosecIsland.webp 2019-03-21 04:50:05 Internet-Exposed IBM BigFix Relays May Lead to Full Remote Compromise (lien direct) Internet-facing relays in IBM BigFix deployments could lead to information disclosure and potential full remote compromise if not properly configured, Atredis Partners security researchers have discovered. Guideline
InfosecIsland.webp 2019-02-14 06:09:00 What CEOs Need to Know About the Future of Cybersecurity (lien direct) CEOs need to take the lead and take stock now in order to ensure that their organizations are better prepared and engaged to deal with these ever-emerging challenges. Guideline
InfosecIsland.webp 2019-01-30 06:00:00 OWASP: What Are the Top 10 Threats and Why Does It Matter? (lien direct) Since the founding of the Open Web Application Security Project (OWASP) in 2001, it has become a leading resource for online security best practices. Guideline
InfosecIsland.webp 2019-01-29 09:23:03 Magento Patches Command Execution, Local File Read Flaws (lien direct) Magento recently addressed two vulnerabilities that could lead to command execution and local file read, a SCRT security researcher reveals. Guideline
InfosecIsland.webp 2019-01-17 09:10:04 Strategies for Winning the Application Security Vulnerability Arms Race (lien direct) Security and development teams need to collaborate closely to ensure that enterprise web and mobile applications are free of vulnerabilities that can lead to costly data breaches. Vulnerability Guideline
InfosecIsland.webp 2018-10-11 07:41:00 How Can Businesses Protect against Phishing Attacks on Employee Smartphones? (lien direct) It is vital that business leaders educate themselves on the types of attacks that today's scammers are using, and advise employees on how best to protect themselves. Guideline
InfosecIsland.webp 2018-10-11 07:32:00 Lessons from Cyber Essentials – Going Back to the Basics (lien direct) IT leaders across all organisations should be working to weave in the Cyber Essentials scheme into the fabric of their businesses. Guideline
InfosecIsland.webp 2018-08-02 08:40:01 Changing Security Behaviors Via a Top Down Approach (lien direct) When it comes to changing behaviors and building better security hygiene, the role of the leader is not only critical, but it is the impetus to change. Guideline
InfosecIsland.webp 2018-06-10 23:42:00 Building a Strong, Intentional and Sustainable Security Culture (lien direct) By understanding the attributes of organizational culture, leaders can make informed choices when trying to change cultures and improve an organization's overall defense. Guideline
InfosecIsland.webp 2017-02-21 05:24:28 Access Management and the Automation of Things (lien direct) Automated tasks make processes better for everyone involved, and result in a happy IT department, where leaders are empowered to live up to their professional potential without being cut off at the knees. Guideline
InfosecIsland.webp 2016-12-14 09:06:00 Driving ROI from Threat Intelligence & Security Operations (lien direct) Security operations teams can no longer afford the time lost with threat intelligence operating in a separate silo. Only by truly weaving TI into the core security fabric and workflow can it lead to accelerating threat mitigation. Guideline
InfosecIsland.webp 2016-11-05 08:34:58 DOM XSS Vulnerability Impacts Over 70 Million Wix Websites (lien direct) A severe DOM (Document Object Model) based XSS (Cross-Site Scripting) vulnerability in Wix.com could lead to an attacker gaining full control of the websites hosted on the platform, Contrast Security researchers warn. Guideline
InfosecIsland.webp 2016-08-17 06:57:41 What the Auto Industry Can Learn from Payments Sector about Cybersecurity (lien direct) An established Root of Trust, combined with industry standards like those adopted by the payments industry and ongoing dialogues among leaders in the field, will ensure the automotive industry stays ahead of security risks associated with connected vehicles. Guideline
InfosecIsland.webp 2016-08-17 05:26:55 Compliance Capabilities: Audit Achievement through Access Management (lien direct) Overall, audits can be a huge headache for organizations and their leaders, but identity and access governance technology can reduce the audit scramble while also providing many additional benefits. Guideline
Last update at: 2024-05-05 06:08:03
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter