www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-10T17:53:57+00:00 www.secnews.physaphae.fr Security Intelligence - Site de news Américain How to Optimize Security Awareness Training for Different Groups 2019-09-26T11:30:23+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/_gfqTSa7QHI/ www.secnews.physaphae.fr/article.php?IdArticle=1362913 False None None None Security Intelligence - Site de news Américain 5 Cyber Skills That Are Essential for the Security Industry\'s Next Decade 2019-09-25T12:15:25+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/5Yr-gQx6DXc/ www.secnews.physaphae.fr/article.php?IdArticle=1360679 False None None None Security Intelligence - Site de news Américain Leading Magecart Group Targeting Captive Wi-Fi Users via L7 Routers 2019-09-25T10:00:24+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/Q2e4YiafgVk/ www.secnews.physaphae.fr/article.php?IdArticle=1360247 False None None None Security Intelligence - Site de news Américain Can Authentication Negatively Impact the User Experience? 2019-09-24T12:00:23+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/X8CN1SZQObg/ www.secnews.physaphae.fr/article.php?IdArticle=1358253 False None None None Security Intelligence - Site de news Américain How to Improve Your Board\'s Oversight of Digital Transformation Efforts 2019-09-24T10:45:22+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/5-DXItGW_Ak/ www.secnews.physaphae.fr/article.php?IdArticle=1358028 False None None None Security Intelligence - Site de news Américain iOS 13 at Work, Part 1: Enabling Single Sign-On (SSO) and Distributing Custom Apps 2019-09-23T14:15:26+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/L9fsNhtGI5o/ www.secnews.physaphae.fr/article.php?IdArticle=1356291 False None None None Security Intelligence - Site de news Américain What Is Unified Threat Management? A Pragmatic Approach to Information Security 2019-09-23T13:00:23+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/u2EvE5OzU-g/ www.secnews.physaphae.fr/article.php?IdArticle=1356195 False Threat None None Security Intelligence - Site de news Américain How to Take Control of Your Privileged Accounts 2019-09-20T14:30:25+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/MhqIcXhlBz4/ www.secnews.physaphae.fr/article.php?IdArticle=1349464 False None None None Security Intelligence - Site de news Américain Night Vision: Navigating the Darknet for Improved Threat Intelligence 2019-09-19T14:15:24+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/2bl3kVgCv7Q/ www.secnews.physaphae.fr/article.php?IdArticle=1346747 False Threat None None Security Intelligence - Site de news Américain Speak Up! How a Graduate Security Architect Learned to Challenge the Status Quo 2019-09-19T14:00:34+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/zhppjLGa1Lg/ www.secnews.physaphae.fr/article.php?IdArticle=1346748 False None None None Security Intelligence - Site de news Américain How Data Loss Prevention (DLP) Can Help Solve the Insider Threat Problem 2019-09-18T13:30:30+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/1LrRdoVjdN4/ www.secnews.physaphae.fr/article.php?IdArticle=1343620 False Threat None None Security Intelligence - Site de news Américain The Future of Cybercrime: Where Are We Headed? 2019-09-18T11:00:25+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/cLXRrD46TKY/ www.secnews.physaphae.fr/article.php?IdArticle=1343307 False None None None Security Intelligence - Site de news Américain Mobile Device Disposal: Best Practices for Burying BYOD Endpoints Without Risk 2019-09-17T15:55:21+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/fBIh-UedidA/ www.secnews.physaphae.fr/article.php?IdArticle=1340559 False None None None Security Intelligence - Site de news Américain Your Users Aren\'t the Weakest Link - They\'re Integral to Your Security Program 2019-09-16T10:45:23+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/vundlnK3xV0/ www.secnews.physaphae.fr/article.php?IdArticle=1336461 False None None None Security Intelligence - Site de news Américain How to Select the Right IDaaS Vendor and Avoid Deployment Pain Points Reading Time: 4 minutes Companies of all sizes are turning to IDaaS vendors to help them protect systems, applications, identities and data wherever they reside - whether in the cloud, on-premises or on mobile devices. ]]> 2019-09-13T10:30:02+00:00 https://securityintelligence.com/posts/how-to-select-the-right-idaas-vendor-and-avoid-deployment-pain-points/ www.secnews.physaphae.fr/article.php?IdArticle=1323822 False None None None Security Intelligence - Site de news Américain The Art of Patch Management Reading Time: 4 minutes The vagaries of systems and organizations, compounded by the irrationality of the human mind and variations in patches themselves, means that patch management is not an exact science - it's an art. ]]> 2019-09-12T11:00:02+00:00 https://securityintelligence.com/articles/the-art-of-patch-management/ www.secnews.physaphae.fr/article.php?IdArticle=1321840 False None None None Security Intelligence - Site de news Américain 5 Things You Can Do After a Data Breach to Help Mitigate Cost Reading Time: 5 minutes The cost of a data breach is rising, and a carefully planned and regularly rehearsed response can go a long way toward saving your company money in the wake of a security incident. ]]> 2019-09-12T10:45:02+00:00 https://securityintelligence.com/posts/5-things-you-can-do-after-a-data-breach-to-help-mitigate-cost/ www.secnews.physaphae.fr/article.php?IdArticle=1321841 False Data Breach None None Security Intelligence - Site de news Américain How Will Strong Customer Authentication Impact the Security of Electronic Payments? Reading Time: 3 minutes The EU's updated Payment Services Directive, PSD2, will introduce a new technical standard that regulates strong customer authentication (SCA). ]]> 2019-09-12T10:35:02+00:00 https://securityintelligence.com/posts/how-will-strong-customer-authentication-impact-the-security-of-electronic-payments/ www.secnews.physaphae.fr/article.php?IdArticle=1321674 False None None None Security Intelligence - Site de news Américain New Poll Shows Consumers\' Expectations on Data Privacy Evolve, But So Does Technology 2019-09-12T10:00:03+00:00 https://securityintelligence.com/posts/new-poll-shows-consumers-expectations-on-data-privacy-evolve-but-so-does-technology/ www.secnews.physaphae.fr/article.php?IdArticle=1321675 False None None None Security Intelligence - Site de news Américain 10 Reasons Cyber Range Simulation Is Vital to Incident Response Reading Time: 4 minutes Is your incident response plan resilient when you're under attack? Simulation in the cyber range can allow you to test how well you perform when it matters. ]]> 2019-09-11T11:00:02+00:00 https://securityintelligence.com/articles/10-reasons-cyber-range-simulation-is-vital-to-incident-response/ www.secnews.physaphae.fr/article.php?IdArticle=1319406 False None None None Security Intelligence - Site de news Américain 10 Surprisingly Bright Spots on the Darknet Reading Time: 4 minutes The darknet isn't all creepy, illegal content. In between criminal marketplaces and hacker forums, there's a few hidden websites that exist for legitimate purposes. ]]> 2019-09-10T11:20:02+00:00 https://securityintelligence.com/articles/10-surprisingly-bright-spots-on-the-darknet/ www.secnews.physaphae.fr/article.php?IdArticle=1317401 False None None None Security Intelligence - Site de news Américain 5 Key Steps to Developing Your Global Data Privacy Program Reading Time: 7 minutes If your organization does business with customers in multiple regions and thus must comply with multiple data privacy regulations, it helps to address them as a single, combined initiative. ]]> 2019-09-09T11:00:02+00:00 https://securityintelligence.com/5-key-steps-to-developing-your-global-data-privacy-program/ www.secnews.physaphae.fr/article.php?IdArticle=1315200 False None None None Security Intelligence - Site de news Américain 3 Reasons Why Traditional Managed Security Services (MSS) Is Out Reading Time: 4 minutes The market for managed security services (MSS) is transitioning from traditional monitoring and management to sophisticated security services driven by AI and human intelligence. ]]> 2019-09-06T14:05:02+00:00 https://securityintelligence.com/posts/3-reasons-why-traditional-managed-security-services-mss-is-out/ www.secnews.physaphae.fr/article.php?IdArticle=1310292 False None None None Security Intelligence - Site de news Américain What Does Good Cyber Resilience Look Like in 2019? Reading Time: 4 minutes As cyber risks increase, cyber resilience in 2019 requires the establishment of measurable baselines and the implementation of tools, such as the NIST Cybersecurity Framework, to minimize risk. ]]> 2019-09-06T14:00:02+00:00 https://securityintelligence.com/articles/what-does-good-cyber-resilience-look-like-in-2019/ www.secnews.physaphae.fr/article.php?IdArticle=1310293 False None None None Security Intelligence - Site de news Américain How Can Financial Services Stem the Tide of Mobile Phishing Attacks? Reading Time: 4 minutes What can financial services organizations do to protect their highly sensitive information from mobile phishing attacks? ]]> 2019-09-05T11:00:02+00:00 https://securityintelligence.com/posts/how-can-financial-services-stem-the-tide-of-mobile-phishing-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=1307494 False None None None Security Intelligence - Site de news Américain Why Fraudsters Are Flying High on Airline Loyalty Programs Reading Time: 6 minutes While the value of airline loyalty programs and the customers they serve is well-established, protecting these assets with security controls needs to be more than an afterthought. ]]> 2019-09-04T14:30:03+00:00 https://securityintelligence.com/why-fraudsters-are-flying-high-on-airline-loyalty-programs/ www.secnews.physaphae.fr/article.php?IdArticle=1305354 False None None None Security Intelligence - Site de news Américain Making the Case for Network Segmentation in AWS Reading Time: 4 minutes Network segmentation, a concept that dates back to the start of enterprise IT systems, is now a routine part of building data centers and application architectures. ]]> 2019-09-04T11:30:02+00:00 https://securityintelligence.com/posts/making-the-case-for-network-segmentation-in-aws/ www.secnews.physaphae.fr/article.php?IdArticle=1304999 False None None None Security Intelligence - Site de news Américain Is Personality the Missing Piece of Security Awareness Training? Reading Time: 3 minutes What if we have been approaching security awareness training all wrong? One way to start individualizing security education is by recognizing and working with personality types. ]]> 2019-09-04T10:30:02+00:00 https://securityintelligence.com/articles/is-personality-the-missing-piece-of-security-awareness-training/ www.secnews.physaphae.fr/article.php?IdArticle=1304850 False None None None Security Intelligence - Site de news Américain Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade Reading Time: 4 minutes Today, the body broker business is unregulated as in centuries past. Security tools such as RFID tracking, blockchain transactions and IAM can help validate the trustworthiness of buyers and sellers. ]]> 2019-09-03T12:15:02+00:00 https://securityintelligence.com/posts/blockchain-transactions-rfid-and-more-7-security-tips-to-help-regulate-the-cadaver-trade/ www.secnews.physaphae.fr/article.php?IdArticle=1303100 False None None None Security Intelligence - Site de news Américain How to Know if Your Cybersecurity Tools Are Actually Working Reading Time: 3 minutes It's time to turn that nagging feeling of uncertainty about the efficacy of your cybersecurity tools into an action plan for gaining the visibility you need. ]]> 2019-08-30T11:45:02+00:00 https://securityintelligence.com/articles/how-to-know-if-your-cybersecurity-tools-are-actually-working/ www.secnews.physaphae.fr/article.php?IdArticle=1295430 False None None None Security Intelligence - Site de news Américain What Is Conditional Access, and Why Does It Matter to You? Reading Time: 3 minutes The shift to mobile and cloud has driven the rise of conditional access, which enables IT security teams to validate devices and users with a set of automated policies to protect networks and data. ]]> 2019-08-30T11:00:03+00:00 https://securityintelligence.com/posts/what-is-conditional-access-and-why-does-it-matter-to-you/ www.secnews.physaphae.fr/article.php?IdArticle=1295319 False None None None Security Intelligence - Site de news Américain How to Get Business Users to Buy Into Your Identity and Access Management (IAM) Strategy Reading Time: 3 minutes Organizations that fail to communicate identity and access management (IAM) processes in relevant business terms often struggle to gain user buy-in. ]]> 2019-08-30T11:00:02+00:00 https://securityintelligence.com/posts/how-to-get-business-users-to-buy-into-your-identity-and-access-management-iam-strategy/ www.secnews.physaphae.fr/article.php?IdArticle=1295320 False None None None Security Intelligence - Site de news Américain Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention Reading Time: 4 minutes If CISOs could make one cybersecurity issue vanish, malware would top the list. While there's no silver-bullet solutions, the world of magic offers insights for effective malware prevention. ]]> 2019-08-29T10:01:00+00:00 https://securityintelligence.com/articles/disappearing-act-what-magic-tricks-can-teach-cisos-about-malware-prevention/ www.secnews.physaphae.fr/article.php?IdArticle=1293018 False Malware None None Security Intelligence - Site de news Américain More_eggs, Anyone? Threat Actor ITG08 Strikes Again Reading Time: 14 minutes X-Force IRIS observed ITG08, which has historically targeted POS machines in the retail and hospitality sectors, injecting malicious code into online checkout pages to steal payment card data. ]]> 2019-08-29T10:00:05+00:00 https://securityintelligence.com/posts/more_eggs-anyone-threat-actor-itg08-strikes-again/ www.secnews.physaphae.fr/article.php?IdArticle=1293019 False Threat None None Security Intelligence - Site de news Américain The Business Case for Privileged Access Management (PAM) Goes Beyond Security and Compliance Reading Time: 6 minutes Privileged access management is often seen as a necessary evil to improve security and compliance. However, PAM solutions offer myriad benefits that can help prove security ROI to business leaders. ]]> 2019-08-28T12:00:02+00:00 https://securityintelligence.com/posts/the-business-case-for-privileged-access-management-pam-goes-beyond-security-and-compliance/ www.secnews.physaphae.fr/article.php?IdArticle=1290672 False Guideline None None Security Intelligence - Site de news Américain Considering Container Security? 6 Ways to Make a Case for Containerization Reading Time: 5 minutes Containerization can create a pathway to secure digital transformation. Discover how to make a business case for container security. ]]> 2019-08-28T11:30:02+00:00 https://securityintelligence.com/articles/considering-container-security-6-ways-to-make-a-case-for-containerization/ www.secnews.physaphae.fr/article.php?IdArticle=1290526 False None None None Security Intelligence - Site de news Américain What Are Advanced Persistent Threats (APTs), and How Do You Find Them? Reading Time: 4 minutes Companies are constrained by insufficient time and resources to detect and respond to advanced persistent threats (APTs). How can SOCs fill the gaps and keep advanced attackers out of their networks? ]]> 2019-08-28T11:00:02+00:00 https://securityintelligence.com/posts/what-are-advanced-persistent-threats-apts-and-how-do-you-find-them/ www.secnews.physaphae.fr/article.php?IdArticle=1290527 False None None None Security Intelligence - Site de news Américain M&A Security Considerations and the Importance of Due Diligence 2019-08-27T11:00:03+00:00 https://securityintelligence.com/posts/ma-security-considerations-and-the-importance-of-due-diligence/ www.secnews.physaphae.fr/article.php?IdArticle=1288022 False None None None Security Intelligence - Site de news Américain The Many Roles of the CISO as Viewed as \'Star Trek\' Characters 2019-08-27T11:00:02+00:00 https://securityintelligence.com/articles/the-many-roles-of-the-ciso-as-viewed-as-star-trek-characters/ www.secnews.physaphae.fr/article.php?IdArticle=1288023 False None None None Security Intelligence - Site de news Américain What Is SIEM and How Does It Enhance Threat Detection? Reading Time: 3 minutes What is SIEM? Security information and event management helps organizations detect threats via fine-grained, real-time visibility into on-premises and cloud-based activity. ]]> 2019-08-26T13:00:02+00:00 https://securityintelligence.com/articles/what-is-siem-and-how-does-it-enhance-threat-detection/ www.secnews.physaphae.fr/article.php?IdArticle=1286326 False Threat None None Security Intelligence - Site de news Américain What\'s New With Q? A Guide to the Next Stage of Android 2019-08-26T11:30:02+00:00 https://securityintelligence.com/posts/whats-new-with-q-a-guide-to-the-next-stage-of-android/ www.secnews.physaphae.fr/article.php?IdArticle=1286096 False None None None Security Intelligence - Site de news Américain Can Fraud Detection Solutions Deliver the Authentication, Risk and Compliance Tools Banks and Insurers Need? Reading Time: 6 minutes Instead of just throwing money at increasingly complex security issues, organizations should embrace fraud detection and user authentication tools that flex to match risk appetite and business goals. ]]> 2019-08-23T13:25:04+00:00 https://securityintelligence.com/can-fraud-detection-solutions-deliver-the-authentication-risk-and-compliance-tools-banks-and-insurers-need/ www.secnews.physaphae.fr/article.php?IdArticle=1281193 False None None None Security Intelligence - Site de news Américain 4 Reasons to Consider a Security Marketing Internship Reading Time: 3 minutes If you're wired to innovate and eager to make the world a better, safer place alongside some of cybersecurity's greatest minds, a security marketing internship may be right for you. ]]> 2019-08-23T13:25:02+00:00 https://securityintelligence.com/posts/4-reasons-to-consider-a-security-marketing-internship/ www.secnews.physaphae.fr/article.php?IdArticle=1281194 False None None None Security Intelligence - Site de news Américain Why Deepfake Audio Technology Is a Real Threat to Enterprise Security Reading Time: 3 minutes Deepfake audio technology has already begun wreaking havoc on the business world. Is your enterprise prepared for this next-generation threat? ]]> 2019-08-23T10:45:02+00:00 https://securityintelligence.com/articles/why-deepfake-audio-technology-is-a-real-threat-to-enterprise-security/ www.secnews.physaphae.fr/article.php?IdArticle=1280849 False Threat None None Security Intelligence - Site de news Américain Digital Identity Trust Life Cycle: Implementing Your Fraud Protection Solution Reading Time: 3 minutes Going live with your fraud protection solution should be a strategic process that enables smooth transitions and positive outcomes. ]]> 2019-08-22T11:30:02+00:00 https://securityintelligence.com/posts/digital-identity-trust-life-cycle-implementing-your-fraud-protection-solution/ www.secnews.physaphae.fr/article.php?IdArticle=1278322 False None None None Security Intelligence - Site de news Américain Securing the Industrial Internet of Things in the Utilities Sector Reading Time: 4 minutes While the industrial internet of things has clear benefits, IIoT environments also have the potential to expose high-value assets or services to a larger attack surface. ]]> 2019-08-21T12:40:02+00:00 https://securityintelligence.com/articles/securing-the-industrial-internet-of-things-in-the-utilities-sector/ www.secnews.physaphae.fr/article.php?IdArticle=1276197 False None None None Security Intelligence - Site de news Américain KuppingerCole Analysts Zoom Out in New Report to Capture IT Landscape\'s Complexity 2019-08-20T17:15:02+00:00 https://securityintelligence.com/posts/kuppingercole-analysts-zoom-out-in-new-report-to-capture-it-landscapes-complexity/ www.secnews.physaphae.fr/article.php?IdArticle=1274388 False None None None Security Intelligence - Site de news Américain How Video Became a Dangerous Delivery Vehicle for Malware Attacks Reading Time: 4 minutes The lure of video might be the perfect social engineering trick for malware attacks. Here's how your enterprise security team can fight back. ]]> 2019-08-19T10:30:03+00:00 https://securityintelligence.com/articles/how-video-became-a-dangerous-delivery-vehicle-for-malware-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=1271087 False Malware None 4.0000000000000000 Security Intelligence - Site de news Américain Context Becomes Key: The \'2019 Gartner Magic Quadrant for Access Management\' 2019-08-19T10:30:02+00:00 https://securityintelligence.com/posts/context-becomes-key-the-2019-gartner-magic-quadrant-for-access-management/ www.secnews.physaphae.fr/article.php?IdArticle=1271088 True Guideline None None Security Intelligence - Site de news Américain 7 Can\'t-Miss Cybersecurity Lessons From Black Hat USA and Vegas Security Week 2019-08-16T11:30:02+00:00 https://securityintelligence.com/articles/7-cant-miss-cybersecurity-lessons-from-black-hat-usa-and-vegas-security-week/ www.secnews.physaphae.fr/article.php?IdArticle=1266196 False None None None Security Intelligence - Site de news Américain Advance Your Red Hat Development With Cybersecurity Reading Time: 3 minutes By applying its user-driven innovation approach to cloud development technologies, Red Hat has made open-source cloud application development ultra-usable and even more secure. ]]> 2019-08-15T13:00:03+00:00 https://securityintelligence.com/posts/advance-your-red-hat-development-with-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=1264379 False None None None Security Intelligence - Site de news Américain 3 Barriers to Identity and Access Management (IAM) Modernization Reading Time: 3 minutes Organizations of all sizes are struggling to modernize their identity and access management programs due to incomplete IAM strategies, poor alignment with the business, legacy systems and more. ]]> 2019-08-15T11:00:02+00:00 https://securityintelligence.com/posts/3-barriers-to-identity-and-access-management-iam-modernization/ www.secnews.physaphae.fr/article.php?IdArticle=1264130 False None None None Security Intelligence - Site de news Américain 3 Ways to Adopt Zero Trust Security Without Rebuilding Your Network Reading Time: 3 minutes Network vulnerabilities can be found in the most unlikely places. That's why companies should adopt zero trust security principles, even if they lack the resources to rebuild the network from scratch. ]]> 2019-08-14T11:45:02+00:00 https://securityintelligence.com/posts/3-ways-to-adopt-zero-trust-security-without-rebuilding-your-network/ www.secnews.physaphae.fr/article.php?IdArticle=1262265 False None None None Security Intelligence - Site de news Américain Is Staff Burnout the Best Reason to Implement Cybersecurity AI? Reading Time: 4 minutes Staff burnout in the cybersecurity industry is at worrisome levels. With more data production and next-generation technology around the corner, now may be the best time to implement cybersecurity AI. ]]> 2019-08-14T11:30:02+00:00 https://securityintelligence.com/articles/is-staff-burnout-the-best-reason-to-implement-cybersecurity-ai/ www.secnews.physaphae.fr/article.php?IdArticle=1262107 False None None None Security Intelligence - Site de news Américain UEM\'s Sophomore Year: \'2019 Gartner Magic Quadrant for Unified Endpoint Management Tools\' 2019-08-13T13:00:03+00:00 https://securityintelligence.com/posts/uems-sophomore-year-2019-gartner-magic-quadrant-for-unified-endpoint-management-tools/ www.secnews.physaphae.fr/article.php?IdArticle=1259949 True Guideline None None Security Intelligence - Site de news Américain Bypass the Cost of Ownership With Security-as-a-Service (SECaaS) Reading Time: 3 minutes For organizations looking to maximize their security budget, security-as-a-service (SECaaS) solutions offer a way to achieve security outcomes without paying the cost of ownership. ]]> 2019-08-13T11:00:02+00:00 https://securityintelligence.com/posts/bypass-the-cost-of-ownership-with-security-as-a-service-secaas/ www.secnews.physaphae.fr/article.php?IdArticle=1259723 False None None None Security Intelligence - Site de news Américain 5G Technology Is Coming, But Is It Already Filled With Security Flaws? Reading Time: 3 minutes There is a lot to be excited about with 5G technology, but it will also open more doors for threat actors to get into networks, making it more difficult to effectively protect endpoints and data. ]]> 2019-08-12T12:10:02+00:00 https://securityintelligence.com/articles/5g-technology-is-coming-but-is-it-already-filled-with-security-flaws/ www.secnews.physaphae.fr/article.php?IdArticle=1258311 False Threat None None Security Intelligence - Site de news Américain What Is Security Intelligence? Here\'s What Your Business Leaders Want to Know 2019-08-12T11:30:02+00:00 https://securityintelligence.com/posts/what-is-security-intelligence-heres-what-your-business-leaders-want-to-know/ www.secnews.physaphae.fr/article.php?IdArticle=1258199 False Threat,Guideline None None Security Intelligence - Site de news Américain How Implementing Cloud Identity Can Improve Security and Data Privacy Reading Time: 3 minutes Digital transformation is changing everything in the business world, including customer relations. Cloud identity can make those transactions more secure and private. ]]> 2019-08-09T11:00:02+00:00 https://securityintelligence.com/articles/how-implementing-cloud-identity-can-improve-security-and-data-privacy/ www.secnews.physaphae.fr/article.php?IdArticle=1252412 False None None None Security Intelligence - Site de news Américain The Curious Case of a Fileless TrickBot Infection Reading Time: 7 minutes IBM X-Force noted changes in the deployment of the TrickBot Trojan and discovered that the most recent version of the malware is fileless. ]]> 2019-08-08T11:15:03+00:00 https://securityintelligence.com/posts/the-curious-case-of-a-fileless-trickbot-infection/ www.secnews.physaphae.fr/article.php?IdArticle=1250568 False Malware None None Security Intelligence - Site de news Américain What Would You Trust to Protect Your Business: Humans or Cybersecurity AI? Reading Time: 5 minutes According to a recent study from Palo Alto Networks and YouGov, some of us have more trust in cybersecurity AI than we do humans when it comes to managing security. ]]> 2019-08-08T10:30:02+00:00 https://securityintelligence.com/articles/what-would-you-trust-to-protect-your-business-humans-or-cybersecurity-ai/ www.secnews.physaphae.fr/article.php?IdArticle=1250450 False None None 3.0000000000000000 Security Intelligence - Site de news Américain From Backhoes to Operating Systems: The Top Five ATM Security Weaknesses Reading Time: 6 minutes Here are the top five ATM security vulnerabilities that X-Force Red, IBM Security's team of veteran hackers, has uncovered during its many years of performing ATM penetration tests. ]]> 2019-08-08T10:00:03+00:00 https://securityintelligence.com/posts/from-backhoes-to-operating-systems-the-top-five-atm-security-weaknesses/ www.secnews.physaphae.fr/article.php?IdArticle=1250451 False None None 2.0000000000000000 Security Intelligence - Site de news Américain Package Delivery! Cybercriminals at Your Doorstep Reading Time: 6 minutes IBM X-Force Red investigated how cybercriminals might seek to exploit package deliveries to hack into corporate or personal home networks right from the office mailroom or from someone's front door. ]]> 2019-08-07T04:05:02+00:00 https://securityintelligence.com/posts/package-delivery-cybercriminals-at-your-doorstep/ www.secnews.physaphae.fr/article.php?IdArticle=1247645 False Hack None None Security Intelligence - Site de news Américain What Is Data Protection and Why Does It Matter? Reading Time: 4 minutes Data protection, when done right, can help drive digital transformation and business growth. How can enterprises deliver consistent, proactive and intelligent data control while enabling innovation? ]]> 2019-08-06T12:00:02+00:00 https://securityintelligence.com/articles/what-is-data-protection-and-why-does-it-matter/ www.secnews.physaphae.fr/article.php?IdArticle=1246265 False None None None Security Intelligence - Site de news Américain Top Five Security Focus Areas for Mainframes Reading Time: 5 minutes Given trends like data center consolidation, hybrid cloud models and new designs that allow mainframes to operate in traditional environments, what better time to reevaluate your mainframe security? ]]> 2019-08-06T10:00:02+00:00 https://securityintelligence.com/posts/top-five-security-focus-areas-for-mainframes/ www.secnews.physaphae.fr/article.php?IdArticle=1246051 False None None None Security Intelligence - Site de news Américain 4 Questions CISOs Need to Ask About Enterprise Cybersecurity Reading Time: 4 minutes It's not always easy to ask the hard questions about enterprise cybersecurity. Here are four questions that CISOs need to answer to boost infosec impact. ]]> 2019-08-05T11:00:02+00:00 https://securityintelligence.com/articles/4-questions-cisos-need-to-ask-about-enterprise-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=1244141 False None None None Security Intelligence - Site de news Américain From State-Sponsored Attackers to Common Cybercriminals: Destructive Attacks on the Rise Reading Time: 4 minutes Destructive attacks have been on the rise, posing a growing threat to a wide variety of businesses who may not consider themselves an obvious target of cybercriminals. ]]> 2019-08-05T07:15:02+00:00 https://securityintelligence.com/posts/from-state-sponsored-attackers-to-common-cybercriminals-destructive-attacks-on-the-rise/ www.secnews.physaphae.fr/article.php?IdArticle=1243767 False Threat None None Security Intelligence - Site de news Américain The Many Dimensions of Effective CISO Leaders Reading Time: 5 minutes Does your CISO have the leadership and business qualities necessary to drive effective management of cyber risks? Let's explore four dimensions that CISOs must learn to master. ]]> 2019-08-02T11:30:02+00:00 https://securityintelligence.com/articles/the-many-dimensions-of-effective-ciso-leaders/ www.secnews.physaphae.fr/article.php?IdArticle=1238644 False Guideline None None Security Intelligence - Site de news Américain Gartner Releases 2019 Market Guide for SOAR Solutions Reading Time: 3 minutes In its new market guide for security orchestration and automation, Gartner predicted, "By year-end 2022, 30% of organizations with a security team larger than five people will leverage SOAR tools." ]]> 2019-08-01T12:50:02+00:00 https://securityintelligence.com/posts/gartner-releases-2019-market-guide-for-soar-solutions/ www.secnews.physaphae.fr/article.php?IdArticle=1236807 False None None None Security Intelligence - Site de news Américain The Secret to a Secure Multicloud Enterprise Is Open Source Reading Time: 3 minutes "Open" may seem like an ironic concept in cybersecurity, but open source can improve or enhance your security posture as more and more technology moves to the cloud. ]]> 2019-08-01T10:00:02+00:00 https://securityintelligence.com/posts/the-secret-to-a-secure-multicloud-enterprise-is-open-source/ www.secnews.physaphae.fr/article.php?IdArticle=1236601 False None None None Security Intelligence - Site de news Américain Facing the Promise and Peril of Facial Recognition for Authentication Reading Time: 6 minutes Great security depends on the ability to know who is authorized and who is not. This applies to both physical and digital security. But how? Increasingly, one answer is facial recognition. ]]> 2019-07-31T11:15:02+00:00 https://securityintelligence.com/articles/facing-the-promise-and-peril-of-facial-recognition-for-authentication/ www.secnews.physaphae.fr/article.php?IdArticle=1234867 False None None None Security Intelligence - Site de news Américain The Digital Identity Trust Life Cycle: Onboarding and Deploying a Fraud Protection Vendor Digital trust expert Rob Rendell explains what components are important for a smooth kickoff and how to prepare both your team and your new fraud protection vendor's team. ]]> 2019-07-30T12:00:04+00:00 https://securityintelligence.com/posts/the-digital-identity-trust-life-cycle-onboarding-and-deploying-a-fraud-protection-vendor/ www.secnews.physaphae.fr/article.php?IdArticle=1233408 False None None None Security Intelligence - Site de news Américain How to Reduce the Risk Posed by Vulnerable Mobile Apps With so many risky mobile apps out there, one way of reducing this risk is to start looking into your BYOD practices and determining if they make sense for your organization. ]]> 2019-07-30T12:00:03+00:00 https://securityintelligence.com/articles/how-to-reduce-the-risk-posed-by-vulnerable-mobile-apps/ www.secnews.physaphae.fr/article.php?IdArticle=1233409 False None None None Security Intelligence - Site de news Américain Cloud Provider Relationships Don\'t Last, So Protect Your Data With an Exit Plan 2019-07-29T10:45:02+00:00 https://securityintelligence.com/posts/cloud-provider-relationships-dont-last-so-protect-your-data-with-an-exit-plan/ www.secnews.physaphae.fr/article.php?IdArticle=1231149 False None None None Security Intelligence - Site de news Américain Is It Time to Start Certifying Connected Devices? Connected devices go through hardware checks and certification before they hit the market. The same cannot be said for software checks, which begs the question: Is it time to start certifying devices? ]]> 2019-07-26T17:45:02+00:00 https://securityintelligence.com/articles/is-it-time-to-start-certifying-connected-devices/ www.secnews.physaphae.fr/article.php?IdArticle=1225566 False None None None Security Intelligence - Site de news Américain How Prepared Is the Financial Services Sector to Respond to a Systemic, Global Cyberattack? Due to its interconnected nature, the financial services industry needs to prepare to respond to a systemic cyberattack that could impact its overarching infrastructure across borders. ]]> 2019-07-26T12:05:02+00:00 https://securityintelligence.com/posts/how-prepared-is-the-financial-services-sector-to-respond-to-a-systemic-global-cyberattack/ www.secnews.physaphae.fr/article.php?IdArticle=1224909 False None None None Security Intelligence - Site de news Américain The Path to Passwordless Authentication Is Shorter Than We Thought The latest Enterprise Management Associates (EMA) data revealed that passwords are problematic. If that's the case, why are organizations so slow to adopt passwordless authentication? ]]> 2019-07-25T14:20:04+00:00 https://securityintelligence.com/posts/the-path-to-passwordless-authentication-is-shorter-than-we-thought/ www.secnews.physaphae.fr/article.php?IdArticle=1223022 False None None None Security Intelligence - Site de news Américain This Is What Experts Say Will Turn the Tide Against Increasing Cyberthreats Most organizations could blunt the vast majority of cyberthreats by making better use of the tools they already have and protecting their most precious data. ]]> 2019-07-25T11:45:02+00:00 https://securityintelligence.com/articles/this-is-what-experts-say-will-turn-the-tide-against-increasing-cyberthreats/ www.secnews.physaphae.fr/article.php?IdArticle=1222750 False None None None Security Intelligence - Site de news Américain 5 IoT Security Conferences You Don\'t Want to Miss 2019-07-24T11:00:02+00:00 https://securityintelligence.com/posts/5-iot-security-conferences-you-dont-want-to-miss/ www.secnews.physaphae.fr/article.php?IdArticle=1221282 False Threat,Guideline None None Security Intelligence - Site de news Américain What\'s New in the 2019 Cost of a Data Breach Report 2019-07-23T13:00:04+00:00 https://securityintelligence.com/posts/whats-new-in-the-2019-cost-of-a-data-breach-report/ www.secnews.physaphae.fr/article.php?IdArticle=1220072 False Data Breach None None Security Intelligence - Site de news Américain Enhance Customer Data Privacy and Digital Trust by Avoiding Dark Patterns Some apps and sites are finding ways to subvert their user interfaces in ways that intentionally manipulate users. These methods are collectively known as dark patterns. ]]> 2019-07-23T12:55:02+00:00 https://securityintelligence.com/articles/enhance-customer-data-privacy-and-digital-trust-by-avoiding-dark-patterns/ www.secnews.physaphae.fr/article.php?IdArticle=1220073 False None None None Security Intelligence - Site de news Américain What\'s Next for Android Device Management in the Enterprise? 2019-07-22T12:00:02+00:00 https://securityintelligence.com/posts/whats-next-for-android-device-management-in-the-enterprise/ www.secnews.physaphae.fr/article.php?IdArticle=1219569 False None None None Security Intelligence - Site de news Américain NIST Says Preparation Is Key to the Risk Management Framework The addition of the Prepare step helps elevate the value of the Risk Management Framework from tactical and operational to organizational and strategic. ]]> 2019-07-22T11:25:02+00:00 https://securityintelligence.com/articles/nist-says-preparation-is-key-to-the-risk-management-framework/ www.secnews.physaphae.fr/article.php?IdArticle=1219410 False None None None Security Intelligence - Site de news Américain The Dark Web Market Is Moving Toward IaaS and MaaS - Here\'s Why 2019-07-22T10:00:02+00:00 https://securityintelligence.com/posts/the-dark-web-market-is-moving-toward-iaas-and-maas-heres-why/ www.secnews.physaphae.fr/article.php?IdArticle=1219411 False None None None Security Intelligence - Site de news Américain How to Create an Effective Incident Response Plan Learn how to respond to cybersecurity breaches in three steps. Build an incident response plan, practice implementing it, and orchestrate and automate to make operations more efficient. ]]> 2019-07-19T12:00:02+00:00 https://securityintelligence.com/articles/how-to-create-an-effective-incident-response-plan/ www.secnews.physaphae.fr/article.php?IdArticle=1214400 False None None 2.0000000000000000 Security Intelligence - Site de news Américain Does Your Cloud Vendor Contract Include These Crucial Security Requirements? Failing to negotiate security requirements into cloud vendor contracts can result in a lack of transparency and formally defined accountability for data security. ]]> 2019-07-18T11:15:02+00:00 https://securityintelligence.com/posts/does-your-cloud-vendor-contract-include-these-crucial-security-requirements/ www.secnews.physaphae.fr/article.php?IdArticle=1212328 False None None None Security Intelligence - Site de news Américain I Can\'t Believe Mirais: Tracking the Infamous IoT Malware 2019-07-18T10:00:03+00:00 https://securityintelligence.com/posts/i-cant-believe-mirais-tracking-the-infamous-iot-malware-2/ www.secnews.physaphae.fr/article.php?IdArticle=1212329 False Malware,Threat None None Security Intelligence - Site de news Américain Enterprise Mobility Management Gets Personal Enterprise mobility management (EMM) is widely adopted, but security leaders still struggle to enroll BYOD and other user-centric models. ]]> 2019-07-17T12:55:02+00:00 https://securityintelligence.com/posts/enterprise-mobility-management-gets-personal/ www.secnews.physaphae.fr/article.php?IdArticle=1210760 False Guideline None 3.0000000000000000 Security Intelligence - Site de news Américain The Expiration Date on Passwords Has Expired Changing your passwords frequently sounds like commonsense advice. However, just because something is common doesn't mean it makes sense. ]]> 2019-07-17T12:40:02+00:00 https://securityintelligence.com/articles/the-expiration-date-on-passwords-has-expired/ www.secnews.physaphae.fr/article.php?IdArticle=1210689 False None None None Security Intelligence - Site de news Américain The Fine Art of Protecting Microsoft Office 365 Apps With Multifactor Authentication When it comes to protecting businesses from the growing variety of Office 365 security threats, balancing the benefits of multifactor authentication with user demands for convenience is a fine art. ]]> 2019-07-16T12:00:04+00:00 https://securityintelligence.com/posts/the-fine-art-of-protecting-microsoft-office-365-apps-with-multifactor-authentication/ www.secnews.physaphae.fr/article.php?IdArticle=1208075 False None None None Security Intelligence - Site de news Américain The Wild West Era Has Ended - What\'s Next for Data Privacy? 2019-07-16T12:00:02+00:00 https://securityintelligence.com/posts/the-wild-west-era-has-ended-whats-next-for-data-privacy/ www.secnews.physaphae.fr/article.php?IdArticle=1208076 False Data Breach None None Security Intelligence - Site de news Américain Threat Intelligence Is the SOC\'s Road Map to DNS Security 2019-07-15T12:00:02+00:00 https://securityintelligence.com/posts/threat-intelligence-is-the-socs-road-map-to-dns-security/ www.secnews.physaphae.fr/article.php?IdArticle=1206135 False Threat None None Security Intelligence - Site de news Américain Why Security Incidents Often Go Underreported If you saw a coworker browsing through a database they weren't supposed to have access to, would you report it? New research suggests that employees often underreport such security incidents. ]]> 2019-07-12T14:00:02+00:00 https://securityintelligence.com/articles/why-security-incidents-often-go-underreported/ www.secnews.physaphae.fr/article.php?IdArticle=1201930 False None None None Security Intelligence - Site de news Américain Take a Proactive Approach to the Darknet Threat A proactive approach to security and intelligence gathering is the best way to stem the tide of threats and lucrative trading of business-critical data on the darknet. ]]> 2019-07-11T15:15:02+00:00 https://securityintelligence.com/articles/take-a-proactive-approach-to-the-darknet-threat/ www.secnews.physaphae.fr/article.php?IdArticle=1201931 False Threat None 5.0000000000000000 Security Intelligence - Site de news Américain The Cyber Kill Chain Is Getting Shorter As the Skills Gap Widens While the cybersecurity skills gap is a years-old challenge, organizations are facing a new conundrum: The cyber kill chain is getting shorter. How can the industry address these dual problems? ]]> 2019-07-10T11:45:02+00:00 https://securityintelligence.com/articles/the-cyber-kill-chain-is-getting-shorter-as-the-skills-gap-widens/ www.secnews.physaphae.fr/article.php?IdArticle=1201932 False None None 5.0000000000000000 Security Intelligence - Site de news Américain Why Cybercriminals Are Targeting Travel and Transportation Why are travel companies increasingly targeted in cyberattacks? Valuable data and customer hospitality demands make the travel and transportation industry especially tempting to cybercriminals. ]]> 2019-07-10T10:00:02+00:00 https://securityintelligence.com/posts/why-cybercriminals-are-targeting-travel-and-transportation/ www.secnews.physaphae.fr/article.php?IdArticle=1201933 False None None None Security Intelligence - Site de news Américain Mobile Device Management Evolves to Support New Device Use Cases As new deployments of screens, IoT devices and other connected endpoints proliferate, mobile device management is key to helping businesses secure, manage and control new mobile-oriented use cases. ]]> 2019-07-09T11:30:02+00:00 https://securityintelligence.com/posts/mobile-device-management-evolves-to-support-new-device-use-cases/ www.secnews.physaphae.fr/article.php?IdArticle=1201934 False None None 3.0000000000000000 Security Intelligence - Site de news Américain Taking Over the Overlay: Reconstructing a Brazilian Remote Access Trojan (RAT) IBM X-Force researchers detected, reverse engineered, reconstructed and simulated a Delphi-based Brazilian remote access Trojan. ]]> 2019-07-09T11:15:04+00:00 https://securityintelligence.com/posts/taking-over-the-overlay-reconstructing-a-brazilian-remote-access-trojan-rat/ www.secnews.physaphae.fr/article.php?IdArticle=1201935 False None None None Security Intelligence - Site de news Américain Your \'Invisible Workforce\' Needs More Visibility in Security Planning 2019-07-08T16:00:02+00:00 https://securityintelligence.com/articles/your-invisible-workforce-needs-more-visibility-in-security-planning/ www.secnews.physaphae.fr/article.php?IdArticle=1201936 False None None 2.0000000000000000 Security Intelligence - Site de news Américain Innovation or Security? With Multifactor Authentication for the Mainframe, You Can Have Both Now that we have tools that provide multifactor authentication (MFA) without friction, it's time to upgrade your mainframe security to participate more fully in the benefits of digital transformation. ]]> 2019-07-08T11:30:02+00:00 https://securityintelligence.com/posts/innovation-or-security-with-multifactor-authentication-for-the-mainframe-you-can-have-both/ www.secnews.physaphae.fr/article.php?IdArticle=1201937 False None None None