Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2021-03-08 19:11:40 |
Intel Corp. to Speak at SecurityWeek Supply Chain Security Summit (lien direct) |
Join Intel on Wednesday, March 10, at SecurityWeek's Supply Chain Security Summit, where industry leaders will examine the current state of supply chain attacks. Hear Intel's experts discuss the need for transparency and integrity across the complete product lifecycle, from build to retire.
|
Guideline
|
|
|
|
2019-10-23 05:17:00 |
Artificial Intelligence: The Next Frontier in Information Security (lien direct) |
The hype can lead to confusion and skepticism over what AI actually is and what it really means for business and security. |
Guideline
|
|
|
|
2019-03-21 04:50:05 |
Internet-Exposed IBM BigFix Relays May Lead to Full Remote Compromise (lien direct) |
Internet-facing relays in IBM BigFix deployments could lead to information disclosure and potential full remote compromise if not properly configured, Atredis Partners security researchers have discovered. |
Guideline
|
|
|
|
2019-02-14 06:09:00 |
What CEOs Need to Know About the Future of Cybersecurity (lien direct) |
CEOs need to take the lead and take stock now in order to ensure that their organizations are better prepared and engaged to deal with these ever-emerging challenges. |
Guideline
|
|
|
|
2019-01-30 06:00:00 |
OWASP: What Are the Top 10 Threats and Why Does It Matter? (lien direct) |
Since the founding of the Open Web Application Security Project (OWASP) in 2001, it has become a leading resource for online security best practices. |
Guideline
|
|
|
|
2019-01-29 09:23:03 |
Magento Patches Command Execution, Local File Read Flaws (lien direct) |
Magento recently addressed two vulnerabilities that could lead to command execution and local file read, a SCRT security researcher reveals. |
Guideline
|
|
|
|
2019-01-17 09:10:04 |
Strategies for Winning the Application Security Vulnerability Arms Race (lien direct) |
Security and development teams need to collaborate closely to ensure that enterprise web and mobile applications are free of vulnerabilities that can lead to costly data breaches. |
Vulnerability
Guideline
|
|
|
|
2018-10-11 07:41:00 |
How Can Businesses Protect against Phishing Attacks on Employee Smartphones? (lien direct) |
It is vital that business leaders educate themselves on the types of attacks that today's scammers are using, and advise employees on how best to protect themselves. |
Guideline
|
|
|
|
2018-10-11 07:32:00 |
Lessons from Cyber Essentials – Going Back to the Basics (lien direct) |
IT leaders across all organisations should be working to weave in the Cyber Essentials scheme into the fabric of their businesses. |
Guideline
|
|
|
|
2018-08-02 08:40:01 |
Changing Security Behaviors Via a Top Down Approach (lien direct) |
When it comes to changing behaviors and building better security hygiene, the role of the leader is not only critical, but it is the impetus to change. |
Guideline
|
|
|
|
2018-06-10 23:42:00 |
Building a Strong, Intentional and Sustainable Security Culture (lien direct) |
By understanding the attributes of organizational culture, leaders can make informed choices when trying to change cultures and improve an organization's overall defense. |
Guideline
|
|
|
|
2017-02-21 05:24:28 |
Access Management and the Automation of Things (lien direct) |
Automated tasks make processes better for everyone involved, and result in a happy IT department, where leaders are empowered to live up to their professional potential without being cut off at the knees. |
Guideline
|
|
|
|
2016-12-14 09:06:00 |
Driving ROI from Threat Intelligence & Security Operations (lien direct) |
Security operations teams can no longer afford the time lost with threat intelligence operating in a separate silo. Only by truly weaving TI into the core security fabric and workflow can it lead to accelerating threat mitigation. |
Guideline
|
|
|
|
2016-11-05 08:34:58 |
DOM XSS Vulnerability Impacts Over 70 Million Wix Websites (lien direct) |
A severe DOM (Document Object Model) based XSS (Cross-Site Scripting) vulnerability in Wix.com could lead to an attacker gaining full control of the websites hosted on the platform, Contrast Security researchers warn.
|
Guideline
|
|
|
|
2016-08-17 06:57:41 |
What the Auto Industry Can Learn from Payments Sector about Cybersecurity (lien direct) |
An established Root of Trust, combined with industry standards like those adopted by the payments industry and ongoing dialogues among leaders in the field, will ensure the automotive industry stays ahead of security risks associated with connected vehicles. |
Guideline
|
|
|
|
2016-08-17 05:26:55 |
Compliance Capabilities: Audit Achievement through Access Management (lien direct) |
Overall, audits can be a huge headache for organizations and their leaders, but identity and access governance technology can reduce the audit scramble while also providing many additional benefits. |
Guideline
|
|
|