www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-10T15:23:28+00:00 www.secnews.physaphae.fr Security Intelligence - Site de news Américain Cyber Storm prédit au Forum économique mondial de 2023 [Cyber Storm Predicted at the 2023 World Economic Forum] Selon les perspectives mondiales de cybersécurité 2023, 93% des chefs de file de la cybersécurité et 86% des chefs d'entreprise pensent & # 160; un cyber-événement de grande envergure est au moins quelque peu probable au cours des deux prochaines années.De plus, 43% des dirigeants organisationnels pensent qu'il est probable qu'une cyberattaque affectera gravement leur organisation au cours des deux prochaines années.Avec cybersécurité [& # 8230;]
>According to the Global Cybersecurity Outlook 2023, 93% of cybersecurity leaders and 86% of business leaders think a far-reaching, catastrophic cyber event is at least somewhat likely in the next two years. Additionally, 43% of organizational leaders think it is likely that a cyberattack will affect their organization severely in the next two years. With cybersecurity […] ]]>
2023-03-29T13:00:00+00:00 https://securityintelligence.com/articles/cyber-storm-predicted-at-the-2023-world-economic-forum/ www.secnews.physaphae.fr/article.php?IdArticle=8322948 False Guideline None 2.0000000000000000
Security Intelligence - Site de news Américain Continuous Threat Exposure Management Stops Modern Threats The modern threat landscape presents serious challenges to businesses struggling to build their security programs.  While these businesses modernize IT and security programs, the attack surface is proliferating. Security leaders must realize that perimeter defenses no longer cope with the expanded attack surface, leaving gaps in security programs. Only by implementing a new systemic approach […] ]]> 2023-03-09T17:00:00+00:00 https://securityintelligence.com/posts/continuous-threat-exposure-management-stops-modern-threats/ www.secnews.physaphae.fr/article.php?IdArticle=8317013 False Threat,Guideline None 2.0000000000000000 Security Intelligence - Site de news Américain What is the Future of Password Managers? In November 2022, LastPass had its second security breach in four months. Although company CEO Karim Toubba assured customers they had nothing to worry about, the incident didn’t inspire confidence in the world’s leading password manager application.  Password managers have one vital job: keep your sensitive login credentials secret, so your accounts remain secure. When hackers […] ]]> 2023-01-17T14:00:00+00:00 https://securityintelligence.com/articles/future-of-password-managers/ www.secnews.physaphae.fr/article.php?IdArticle=8301862 False Guideline LastPass 2.0000000000000000 Security Intelligence - Site de news Américain The Cost of a Data Breach for Government Agencies What happens when attackers breach local government, police departments or public health services? What would happen if attackers compromised the U.S. Treasury’s network? These types of incidents happen every month and lead to service interruptions at the very least. More serious problems could occur, such as leakage of classified data or damage to critical infrastructure. […] ]]> 2022-09-07T10:00:00+00:00 https://securityintelligence.com/articles/cost-data-breach-government-agencies/ www.secnews.physaphae.fr/article.php?IdArticle=6766152 False Data Breach,Guideline None None Security Intelligence - Site de news Américain How and Why Do Teens Become Cyber Criminals? The search to find the mastermind of the attacker group Lapsus$ led to a home outside Oxford, England. The suspected leader was a 16-year-old. He helped take down some of the world’s biggest companies, including Microsoft, from his mother’s house. The BBC reported the teen is alleged to have earned $14 million from his attacks. […] ]]> 2022-08-30T13:00:00+00:00 https://securityintelligence.com/articles/why-teens-become-cyber-criminals/ www.secnews.physaphae.fr/article.php?IdArticle=6625099 False Guideline None None Security Intelligence - Site de news Américain The Ransomware Playbook Mistakes That Can Cost You Millions If there is one type of cyberattack that can drain the color from any security leader’s face, it’s ransomware. A crippling, disruptive, and expensive attack to recover from, with final costs rarely being easy to foretell. Already a prevalent threat, the number of ransomware attacks rose during the pandemic and nearly doubled in the year […] ]]> 2022-08-24T10:00:00+00:00 https://securityintelligence.com/posts/ransomware-playbook-mistakes-cost-you-millions/ www.secnews.physaphae.fr/article.php?IdArticle=6500021 False Ransomware,Guideline None None Security Intelligence - Site de news Américain 4 Ways AI Capabilities Transform Security Many industries have had to tighten belts in the “new normal”. In cybersecurity, artificial intelligence (AI) can help. Every day of the new normal we learn how the pandemic sped up digital transformation, as reflected in the new opportunities and new risks. For many, organizational complexity and legacy infrastructure and support processes are the leading […] ]]> 2022-06-29T16:00:00+00:00 https://securityintelligence.com/posts/ai-capabilities-transform-security/ www.secnews.physaphae.fr/article.php?IdArticle=5454478 False Guideline None None Security Intelligence - Site de news Américain Recovering Ransom Payments: Is This the End of Ransomware? What’s the best way to stop ransomware? Make it riskier and less lucrative for cyber criminals. Nearly all intruders prefer to collect a ransom in cryptocurrency. But it’s a double-edged sword since even crypto leaves a money trail. Recovering ransomware payouts could lead to a sharp decline in exploits. Ransomware is still today’s top attack […] ]]> 2022-06-02T13:00:00+00:00 https://securityintelligence.com/articles/recovering-ransomware-payment/ www.secnews.physaphae.fr/article.php?IdArticle=4932567 False Ransomware,Guideline None None Security Intelligence - Site de news Américain Technologies Useful In the Pandemic Are Challenging Privacy Now 2022-05-02T13:00:00+00:00 https://securityintelligence.com/articles/technologies-useful-pandemic-challenging-privacy/ www.secnews.physaphae.fr/article.php?IdArticle=4532737 False Guideline None None Security Intelligence - Site de news Américain Protecting Your Data From a Unique Threat: Misinformation 2022-01-04T14:00:00+00:00 https://securityintelligence.com/articles/protecting-data-from-misinformation-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=3923136 False Threat,Guideline None None Security Intelligence - Site de news Américain It\'s Not Too Soon to Start Talking About 6G 2021-12-17T14:00:00+00:00 https://securityintelligence.com/articles/its-not-too-soon-start-talking-about-6g/ www.secnews.physaphae.fr/article.php?IdArticle=3814034 False Guideline None None Security Intelligence - Site de news Américain Taking Threat Detection and Response to the Next Level with Open XDR 2021-11-02T13:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/7a4fUn2l3mE/ www.secnews.physaphae.fr/article.php?IdArticle=3598422 False Threat,Guideline None None Security Intelligence - Site de news Américain Remote Work Security: Handling Setbacks in the Time of COVID-19 2021-10-29T13:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/VM8bqwaChVQ/ www.secnews.physaphae.fr/article.php?IdArticle=3580432 False Guideline None None Security Intelligence - Site de news Américain Trickbot Rising - Gang Doubles Down on Infection Efforts to Amass Network Footholds 2021-10-13T10:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/r3DvOZvslGE/ www.secnews.physaphae.fr/article.php?IdArticle=3508595 False Ransomware,Malware,Guideline None None Security Intelligence - Site de news Américain Mission Probable: Access Granted 2021-09-15T16:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/cm2jeqwqysE/ www.secnews.physaphae.fr/article.php?IdArticle=3372890 False Guideline None None Security Intelligence - Site de news Américain 5 Ways to Use Microlearning to Educate Your Employees About Cybersecurity 2021-09-10T13:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/UbQAxqQqu7k/ www.secnews.physaphae.fr/article.php?IdArticle=3359504 False Guideline None None Security Intelligence - Site de news Américain How to Quantify the Actual Cost of a Data Breach for Your Own Organization 2021-08-25T16:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/uAEnDKbcbkU/ www.secnews.physaphae.fr/article.php?IdArticle=3282985 False Data Breach,Guideline None None Security Intelligence - Site de news Américain Beyond Ransomware: Four Threats Facing Companies Today 2021-07-21T16:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/Y_KmQlds5ck/ www.secnews.physaphae.fr/article.php?IdArticle=3106710 False Guideline None None Security Intelligence - Site de news Américain How One Application Test Uncovered an Unexpected Opening in an Enterprise Call Tool 2021-06-22T20:15:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/AnI1Cy9XetU/ www.secnews.physaphae.fr/article.php?IdArticle=2967791 False Tool,Vulnerability,Guideline None None Security Intelligence - Site de news Américain Thoughts From a Data Security Expert: 3 Things That Keep Me Up at Night 2021-06-09T13:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/uO3rxzcnXOM/ www.secnews.physaphae.fr/article.php?IdArticle=2896164 False Guideline None None Security Intelligence - Site de news Américain Cyber Extortion: What You Need to Know in 2021 2021-06-02T11:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/kXsfp-66kQY/ www.secnews.physaphae.fr/article.php?IdArticle=2868148 False Ransomware,Guideline None None Security Intelligence - Site de news Américain Strike First: The Benefits of Working With an Ethical Hacker 2021-05-31T14:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/wqlJPVwbleA/ www.secnews.physaphae.fr/article.php?IdArticle=2863545 False Threat,Guideline None None Security Intelligence - Site de news Américain 5 Unique Online Scams and How to Defend Against Them 2021-05-21T21:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/-pZLSKhsJK8/ www.secnews.physaphae.fr/article.php?IdArticle=2822951 False Guideline None None Security Intelligence - Site de news Américain Shedding Light on the DarkSide Ransomware Attack 2021-05-10T21:20:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/-zy__Bm1AQw/ www.secnews.physaphae.fr/article.php?IdArticle=2764290 False Ransomware,Threat,Guideline None None Security Intelligence - Site de news Américain Why You Need Attack Surface Management (And How To Achieve It) 2021-04-22T16:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/-9cj5Ly9TJQ/ www.secnews.physaphae.fr/article.php?IdArticle=2679426 False Guideline None None Security Intelligence - Site de news Américain IBM Security Guardium Named Industry Leader for Third Consecutive Time 2021-04-22T13:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/zJ6xeaeIAmM/ www.secnews.physaphae.fr/article.php?IdArticle=2678571 False Guideline None 5.0000000000000000 Security Intelligence - Site de news Américain 5 Ways to Overcome Cloud Security Challenges 2021-02-11T16:30:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/zRau4W4WfJg/ www.secnews.physaphae.fr/article.php?IdArticle=2332038 False Guideline None None Security Intelligence - Site de news Américain AI Security: Curation, Context and Other Keys to the Future 2021-02-11T14:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/X8mekzxBXss/ www.secnews.physaphae.fr/article.php?IdArticle=2331314 False Guideline None None Security Intelligence - Site de news Américain Employee Mental Health: Managing Stress and Trauma 2021-02-09T15:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/J-UWL8cgxdw/ www.secnews.physaphae.fr/article.php?IdArticle=2318643 False Guideline None None Security Intelligence - Site de news Américain Does a Strong Privacy Program Make for a Stronger Security Program? 2021-02-04T15:30:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/lJzxtTT0plY/ www.secnews.physaphae.fr/article.php?IdArticle=2294394 False Guideline None None Security Intelligence - Site de news Américain A Look at HTTP Parameter Pollution and How To Prevent It 2021-02-03T14:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/2OvFuM2kf-Q/ www.secnews.physaphae.fr/article.php?IdArticle=2289195 False Threat,Guideline None None Security Intelligence - Site de news Américain Credential Stuffing: AI\'s Role in Slaying a Hydra 2021-01-25T13:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/Jm0lNVfGD1Y/ www.secnews.physaphae.fr/article.php?IdArticle=2241966 False Data Breach,Threat,Guideline None None Security Intelligence - Site de news Américain Reaching Strategic Outcomes With An MDR Provider: Part 3 2020-12-03T18:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/ny46Er90UEw/ www.secnews.physaphae.fr/article.php?IdArticle=2075457 True Guideline None None Security Intelligence - Site de news Américain Shadow IT: Addressing the Risks in Remote Work Environments 2020-11-23T15:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/2unuU0rC7mw/ www.secnews.physaphae.fr/article.php?IdArticle=2051138 False Guideline None None Security Intelligence - Site de news Américain Security Culture: Putting Digital Literacy First in Your Company 2020-11-20T15:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/mJGzXL7y6-k/ www.secnews.physaphae.fr/article.php?IdArticle=2046809 False Guideline None None Security Intelligence - Site de news Américain Implement Cloud Security Best Practices With This Guide 2020-11-12T12:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/X_xm-lC_o4g/ www.secnews.physaphae.fr/article.php?IdArticle=2030626 False Guideline None None Security Intelligence - Site de news Américain Assessing Security Operation Centers Using a Balanced Scorecard 2020-11-12T11:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/x6RD8kRP9iY/ www.secnews.physaphae.fr/article.php?IdArticle=2030508 False Guideline None None Security Intelligence - Site de news Américain Data Security by the Numbers: How a Smarter Approach Saves Time and Money 2020-11-09T18:30:57+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/Ikq6HuTgFDQ/ www.secnews.physaphae.fr/article.php?IdArticle=2025310 False Guideline None None Security Intelligence - Site de news Américain Don\'t Torpedo Your Data Security Program: 5 Best Practices to Consider 2020-10-29T12:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/XS5AAKS34AU/ www.secnews.physaphae.fr/article.php?IdArticle=2002059 False Guideline None None Security Intelligence - Site de news Américain IBM Named a CIAM Leader in the Forrester Wave Report 2020-10-08T15:03:18+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/BfVqQZLkxSs/ www.secnews.physaphae.fr/article.php?IdArticle=1964231 False Guideline None None Security Intelligence - Site de news Américain Autonomous Vehicle Security Needs From A Hacker\'s Perspective 2020-10-08T12:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/0bGzujkQWrw/ www.secnews.physaphae.fr/article.php?IdArticle=1963357 False Guideline None None Security Intelligence - Site de news Américain Uncover Return on Investment From Using a SOAR Platform 2020-09-22T19:30:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/utjbC_eyhVw/ www.secnews.physaphae.fr/article.php?IdArticle=1933000 False Guideline None None Security Intelligence - Site de news Américain Risk Management: How Security Can Learn to Do the Math 2020-09-17T00:11:14+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/FvDlEb_gc_c/ www.secnews.physaphae.fr/article.php?IdArticle=1921584 False Guideline None None Security Intelligence - Site de news Américain Cybersecurity Operations: 5 Ways to Cut Costs Without Pain 2020-08-25T10:30:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/zfTddaix9Vo/ www.secnews.physaphae.fr/article.php?IdArticle=1881075 False Guideline None None Security Intelligence - Site de news Américain How Can Enterprises Protect Personally Identifiable Information? 2020-08-24T11:45:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/n_yeG7MgwxQ/ www.secnews.physaphae.fr/article.php?IdArticle=1879285 False Threat,Guideline None None Security Intelligence - Site de news Américain Your Newest Cybersecurity Professional Is Already in Your Company 2020-08-20T12:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/cq7gfPPoMhA/ www.secnews.physaphae.fr/article.php?IdArticle=1871960 False Guideline None None Security Intelligence - Site de news Américain How Employing Encryption for Data Security Changed History 2020-08-03T16:00:27+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/soHAtMcoc_I/ www.secnews.physaphae.fr/article.php?IdArticle=1839713 False Tool,Guideline None None Security Intelligence - Site de news Américain Enhance Integrated Risk Management Solutions With Modern Technologies 2020-07-30T16:16:07+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/5FzwN3jKag4/ www.secnews.physaphae.fr/article.php?IdArticle=1833380 False Guideline None None Security Intelligence - Site de news Américain 5 Core Tenets for Effective Multicloud Security 2020-07-24T11:15:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/UVcaPIaGk0A/ www.secnews.physaphae.fr/article.php?IdArticle=1822933 False Guideline None None Security Intelligence - Site de news Américain Deciphering Between Incident Management and Crisis Management 2020-07-16T11:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/wqoqaFuZXg8/ www.secnews.physaphae.fr/article.php?IdArticle=1807665 False Guideline None None Security Intelligence - Site de news Américain These Cybersecurity Trends Could Get a Boost in 2020 2020-06-29T09:00:06+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/uiM_EI_JW80/ www.secnews.physaphae.fr/article.php?IdArticle=1780046 False Guideline None None Security Intelligence - Site de news Américain How Cybersecurity Leaders Can Chart the Seas of Business Communication 2020-06-03T13:01:29+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/Sw9N8UW6-0Q/ www.secnews.physaphae.fr/article.php?IdArticle=1748279 False Guideline None None Security Intelligence - Site de news Américain Defragging Security With a Platform Approach 2020-04-17T12:00:23+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/7g0szzRTiPw/ www.secnews.physaphae.fr/article.php?IdArticle=1660413 False Guideline None 4.0000000000000000 Security Intelligence - Site de news Américain What Leadership Qualities for CISOs Are Most Important in 2020? 2020-02-07T14:01:28+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/dc_35cHKas0/ www.secnews.physaphae.fr/article.php?IdArticle=1529578 False Guideline None None Security Intelligence - Site de news Américain When Stalkerware Stalks the Enterprise 2019-12-03T12:00:21+00:00 https://securityintelligence.com/articles/when-stalkerware-stalks-the-enterprise/ www.secnews.physaphae.fr/article.php?IdArticle=1493651 False Threat,Guideline None None Security Intelligence - Site de news Américain Change the Security Conversation to Help Advance Your Business 2019-11-18T11:00:21+00:00 https://securityintelligence.com/posts/change-the-security-conversation-to-help-advance-your-business/ www.secnews.physaphae.fr/article.php?IdArticle=1473703 False Guideline None None Security Intelligence - Site de news Américain 10 Differences Between Digital Transformation Leaders and Laggards 2019-11-11T14:01:09+00:00 https://securityintelligence.com/articles/10-differences-between-digital-transformation-leaders-and-laggards/ www.secnews.physaphae.fr/article.php?IdArticle=1460728 False Guideline None None Security Intelligence - Site de news Américain Identity Analytics and the \'2019 Gartner Magic Quadrant for Identity Governance and Administration\' 2019-10-18T17:00:22+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/usMQ9mNK6c4/ www.secnews.physaphae.fr/article.php?IdArticle=1411634 True Guideline None None Security Intelligence - Site de news Américain The Business Case for Privileged Access Management (PAM) Goes Beyond Security and Compliance Reading Time: 6 minutes Privileged access management is often seen as a necessary evil to improve security and compliance. However, PAM solutions offer myriad benefits that can help prove security ROI to business leaders. ]]> 2019-08-28T12:00:02+00:00 https://securityintelligence.com/posts/the-business-case-for-privileged-access-management-pam-goes-beyond-security-and-compliance/ www.secnews.physaphae.fr/article.php?IdArticle=1290672 False Guideline None None Security Intelligence - Site de news Américain Context Becomes Key: The \'2019 Gartner Magic Quadrant for Access Management\' 2019-08-19T10:30:02+00:00 https://securityintelligence.com/posts/context-becomes-key-the-2019-gartner-magic-quadrant-for-access-management/ www.secnews.physaphae.fr/article.php?IdArticle=1271088 True Guideline None None Security Intelligence - Site de news Américain UEM\'s Sophomore Year: \'2019 Gartner Magic Quadrant for Unified Endpoint Management Tools\' 2019-08-13T13:00:03+00:00 https://securityintelligence.com/posts/uems-sophomore-year-2019-gartner-magic-quadrant-for-unified-endpoint-management-tools/ www.secnews.physaphae.fr/article.php?IdArticle=1259949 True Guideline None None Security Intelligence - Site de news Américain What Is Security Intelligence? Here\'s What Your Business Leaders Want to Know 2019-08-12T11:30:02+00:00 https://securityintelligence.com/posts/what-is-security-intelligence-heres-what-your-business-leaders-want-to-know/ www.secnews.physaphae.fr/article.php?IdArticle=1258199 False Threat,Guideline None None Security Intelligence - Site de news Américain The Many Dimensions of Effective CISO Leaders Reading Time: 5 minutes Does your CISO have the leadership and business qualities necessary to drive effective management of cyber risks? Let's explore four dimensions that CISOs must learn to master. ]]> 2019-08-02T11:30:02+00:00 https://securityintelligence.com/articles/the-many-dimensions-of-effective-ciso-leaders/ www.secnews.physaphae.fr/article.php?IdArticle=1238644 False Guideline None None Security Intelligence - Site de news Américain 5 IoT Security Conferences You Don\'t Want to Miss 2019-07-24T11:00:02+00:00 https://securityintelligence.com/posts/5-iot-security-conferences-you-dont-want-to-miss/ www.secnews.physaphae.fr/article.php?IdArticle=1221282 False Threat,Guideline None None Security Intelligence - Site de news Américain Enterprise Mobility Management Gets Personal Enterprise mobility management (EMM) is widely adopted, but security leaders still struggle to enroll BYOD and other user-centric models. ]]> 2019-07-17T12:55:02+00:00 https://securityintelligence.com/posts/enterprise-mobility-management-gets-personal/ www.secnews.physaphae.fr/article.php?IdArticle=1210760 False Guideline None 3.0000000000000000 Security Intelligence - Site de news Américain Exploring Ponemon Data: After 4 Years, Is Security Satiated With False Confidence? The "2019 Ponemon Institute Study on the Cyber Resilient Organization" found that although security leaders are more confident in their cyber resilience, they are still overlooking critical areas. ]]> 2019-05-02T13:55:02+00:00 https://securityintelligence.com/posts/exploring-ponemon-data-after-4-years-is-security-satiated-with-false-confidence/ www.secnews.physaphae.fr/article.php?IdArticle=1097449 False Guideline None None Security Intelligence - Site de news Américain KuppingerCole Report: Leadership Compass of Access Management and Federation IBM Security Access Manager (ISAM) is rated as a leader in the Product, Marketing and Technology Leadership categories in KuppingerCole's Leadership Compass report on access management and federation. ]]> 2019-04-15T18:50:02+00:00 https://securityintelligence.com/kuppingercole-report-leadership-compass-of-access-management-and-federation/ www.secnews.physaphae.fr/article.php?IdArticle=1094167 False Guideline None None Security Intelligence - Site de news Américain Capture the Flag Competitions Can Help Close the Security Skills Gap A capture the flag exercise gives security professionals and business leaders an opportunity to drill their cybersecurity response skills in a low-pressure yet highly engaging environment. ]]> 2019-04-04T12:00:02+00:00 https://securityintelligence.com/capture-the-flag-competitions-can-help-close-the-security-skills-gap/ www.secnews.physaphae.fr/article.php?IdArticle=1088621 False Guideline None None Security Intelligence - Site de news Américain A Busy IT Infrastructure Can Lead to Security Disaster Smartphones, tablets and cloud computing have been leading the way in the workplace until now, but the growing popularity of the internet of things could totally change the look of IT infrastructure. ]]> 2019-03-29T11:00:02+00:00 https://securityintelligence.com/a-busy-it-infrastructure-can-lead-to-security-disaster/ www.secnews.physaphae.fr/article.php?IdArticle=1086555 False Guideline None None Security Intelligence - Site de news Américain How to Lift the Veil on Mobile Application Security Threats Today's security leaders are tasked with complying with data privacy laws and enhancing user productivity while preserving their agility and securing them from mobile application security threats. ]]> 2019-03-26T12:30:02+00:00 https://securityintelligence.com/how-to-lift-the-veil-on-mobile-application-security-threats/ www.secnews.physaphae.fr/article.php?IdArticle=1081856 False Guideline None None Security Intelligence - Site de news Américain Adopting the NIST 800-53 Control Framework? Learn More About the Anticipated Changes in 2019 Organizations adopting NIST 800-53 should understand how upcoming changes will affect senior leadership accountability, data privacy and third-party assessments. ]]> 2019-03-25T16:40:02+00:00 https://securityintelligence.com/adopting-the-nist-800-53-control-framework-learn-more-about-the-anticipated-changes-in-2019/ www.secnews.physaphae.fr/article.php?IdArticle=1080853 False Guideline None None Security Intelligence - Site de news Américain Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics By following the example of industry leaders with mature security analytics capabilities, less advanced organizations can improve SOC visibility and shift from reactive to proactive threat detection. ]]> 2019-03-01T13:00:02+00:00 https://securityintelligence.com/follow-the-leaders-7-tried-and-true-tips-to-get-the-most-out-of-your-security-analytics/ www.secnews.physaphae.fr/article.php?IdArticle=1047665 False Threat,Guideline None None Security Intelligence - Site de news Américain It\'s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare 2019-02-05T13:20:04+00:00 https://securityintelligence.com/its-time-to-modernize-traditional-threat-intelligence-models-for-cyber-warfare/ www.secnews.physaphae.fr/article.php?IdArticle=1020210 False Threat,Guideline None None Security Intelligence - Site de news Américain Manage Emerging Cybersecurity Risks by Rallying Around Mutual Concerns Chief information security officers (CISOs) are looking for ways to set the tone for the year and have more engaged conversations with top leadership regarding cybersecurity risks. ]]> 2019-02-04T12:45:03+00:00 https://securityintelligence.com/manage-emerging-cybersecurity-risks-by-rallying-around-mutual-concerns/ www.secnews.physaphae.fr/article.php?IdArticle=1020212 False Guideline None None Security Intelligence - Site de news Américain How Fraud Specialist Danna Pelleg Fights Bad Guys With the Best Team in the Business Danna Pelleg's childhood curiosity, early technology education and compulsion to fight the bad guys led her to a career as a fraud specialist and security operations team lead at IBM Trusteer. ]]> 2019-01-30T14:35:02+00:00 https://securityintelligence.com/how-fraud-specialist-danna-pelleg-fights-bad-guys-with-the-best-team-in-the-business/ www.secnews.physaphae.fr/article.php?IdArticle=1015125 False Guideline None None Security Intelligence - Site de news Américain Social Engineering Training: Why Getting Hacked Is a Security Advantage Social engineering and security awareness training exercises can help business leaders uncover gaps in their incident response plans and identify poor security hygiene among employees. ]]> 2019-01-28T17:30:03+00:00 https://securityintelligence.com/social-engineering-training-why-getting-hacked-is-a-security-advantage/ www.secnews.physaphae.fr/article.php?IdArticle=1012388 False Guideline None None Security Intelligence - Site de news Américain As BYOD Adoption and Mobile Threats Increase, Can Enterprise Data Security Keep Up? While most security professionals have come to embrace bring-your-own-device (BYOD) policies, leadership still often lacks confidence in the data security of employees' personal devices. ]]> 2019-01-24T13:45:03+00:00 https://securityintelligence.com/as-byod-adoption-and-mobile-threats-increase-can-enterprise-data-security-keep-up/ www.secnews.physaphae.fr/article.php?IdArticle=1007254 False Guideline None None Security Intelligence - Site de news Américain How Former Bomb Disposal Expert and Lighting Designer Shaked Vax Pivoted Toward a Cybersecurity Career Shaked Vax dismantles bombs and created light shows for rock stars before starting his cybersecurity career. Now he's leading IBM Trusteer's move into frictionless identity management. ]]> 2019-01-23T14:00:04+00:00 https://securityintelligence.com/how-former-bomb-disposal-expert-and-lighting-designer-shaked-vax-pivoted-toward-a-cybersecurity-career/ www.secnews.physaphae.fr/article.php?IdArticle=1005516 False Guideline None None Security Intelligence - Site de news Américain Protect Your Critical Assets in a Landscape of Expanding Attack Surfaces Security leaders face more challenges to protect critical assets than ever. The evolving enterprise landscape has created a need for new frameworks and solutions to achieve visibility and control. ]]> 2019-01-14T13:00:04+00:00 https://securityintelligence.com/three-steps-you-can-take-to-protect-your-critical-assets/ www.secnews.physaphae.fr/article.php?IdArticle=991516 False Guideline None None Security Intelligence - Site de news Américain How the Financial Services Industry Is Preparing to Avoid and Respond to Systemic Cyberattacks Financial services industry leaders visited the IBM X-Force Command Cyber Range for a war game exercise designed to battle-test their response to a systemic cyberattack. ]]> 2019-01-10T14:30:02+00:00 https://securityintelligence.com/how-the-financial-services-industry-is-preparing-to-avoid-and-respond-to-systemic-cyberattacks/ www.secnews.physaphae.fr/article.php?IdArticle=984934 False Guideline None None Security Intelligence - Site de news Américain Is It Time for Enterprises to Bid Farewell to BYOD? As BYOD practices blur the boundary of the enterprise perimeter, how can security leaders ensure corporate data is safe? ]]> 2019-01-07T12:55:02+00:00 https://securityintelligence.com/is-it-time-for-enterprises-to-bid-farewell-to-byod/ www.secnews.physaphae.fr/article.php?IdArticle=978882 False Guideline None None Security Intelligence - Site de news Américain 4 Ways to Overcome the Cyber Workforce Shortage The supply/demand ratio for the cyber workforce is now about 2.3 skilled workers per job opening, according to NIST. Security leaders need to be more creative to fill the gaps in their teams. ]]> 2018-12-26T12:50:02+00:00 https://securityintelligence.com/4-ways-to-overcome-the-cyber-workforce-shortage/ www.secnews.physaphae.fr/article.php?IdArticle=965467 False Guideline None None Security Intelligence - Site de news Américain From Naughty to NICE: Best Practices for K–12 Cybersecurity Education The National Institute for Cybersecurity Education is leading the charge in K–12 security awareness training. ]]> 2018-12-18T11:55:01+00:00 https://securityintelligence.com/from-naughty-to-nice-best-practices-for-k-12-cybersecurity-education/ www.secnews.physaphae.fr/article.php?IdArticle=952246 False Guideline None None Security Intelligence - Site de news Américain 3 Security Business Benefits From a 2018 Gartner Magic Quadrant SIEM Leader The main characteristics of a SIEM leader are centered around innovation in early threat detection, adaptation to customer environments and strong market presence. ]]> 2018-12-12T16:45:02+00:00 https://securityintelligence.com/3-security-business-benefits-from-a-2018-gartner-magic-quadrant-siem-leader/ www.secnews.physaphae.fr/article.php?IdArticle=942997 False Threat,Guideline None 3.0000000000000000 Security Intelligence - Site de news Américain How Tomer Agayev Fights Financial Fraud Through Curiosity, Suspicion and Education As threat research team lead at Trusteer, Tomer guards the gateway to both known and unknown threats and passes along his insights to help banking customers protect themselves from social engineering. ]]> 2018-12-07T15:35:01+00:00 https://securityintelligence.com/how-tomer-agayev-fights-financial-fraud-through-curiosity-suspicion-and-education/ www.secnews.physaphae.fr/article.php?IdArticle=939686 False Threat,Guideline None None Security Intelligence - Site de news Américain How Can Government Security Teams Overcome Obstacles in IT Automation Deployment? IT automation is the future of security programs, but it's not simply plug-and-play. SOC leaders must implement this technology thoughtfully to unlock the full range of benefits. ]]> 2018-12-05T12:40:01+00:00 https://securityintelligence.com/how-can-government-security-teams-overcome-obstacles-in-it-automation-deployment/ www.secnews.physaphae.fr/article.php?IdArticle=935427 False Guideline None None Security Intelligence - Site de news Américain How to Prepare for the Coming 5G Security Threats 5G communications networks will empower a future that some are calling the "Fourth Industrial Revolution" - but security leaders must prepare for the coming 5G security threats. ]]> 2018-11-26T12:20:03+00:00 https://securityintelligence.com/how-to-prepare-for-the-coming-5g-security-threats/ www.secnews.physaphae.fr/article.php?IdArticle=920384 False Guideline None None Security Intelligence - Site de news Américain The Forrester Wave: Unified Endpoint Management, Q4 2018 - New Acronyms, New Leaders and How Device Management Has Evolved IBM was named a leader in the "2018 Forrester Wave: Unified Endpoint Management, Q4 2018" report, and MaaS360 earned recognition as the best current offering in the marketplace. ]]> 2018-11-21T14:00:02+00:00 https://securityintelligence.com/the-forrester-wave-unified-endpoint-management-q4-2018-new-acronyms-new-leaders-and-how-device-management-has-evolved/ www.secnews.physaphae.fr/article.php?IdArticle=910201 False Guideline None None Security Intelligence - Site de news Américain How Can Industry Leaders and Academia Help Improve Cybersecurity Education? It's up to security and educational leaders alike to improve and expand opportunities for cybersecurity education. ]]> 2018-11-14T12:05:01+00:00 https://securityintelligence.com/how-can-industry-leaders-and-academia-help-improve-cybersecurity-education/ www.secnews.physaphae.fr/article.php?IdArticle=896180 False Guideline None None Security Intelligence - Site de news Américain 3 Creative Strategies to Narrow the Skills Gap The cybersecurity skills gap will continue to grow until executive leadership takes more creative steps to narrow it. ]]> 2018-11-05T13:05:02+00:00 https://securityintelligence.com/3-creative-strategies-to-narrow-the-skills-gap/ www.secnews.physaphae.fr/article.php?IdArticle=880866 False Guideline None None Security Intelligence - Site de news Américain How to Develop an Immersive Cybersecurity Simulation A well-planned cybersecurity simulation can help the entire organization, from incident responders to top leadership, practice their crisis management skills in a low-stakes yet immersive environment. ]]> 2018-10-31T11:30:01+00:00 https://securityintelligence.com/how-to-develop-an-immersive-cybersecurity-simulation/ www.secnews.physaphae.fr/article.php?IdArticle=872406 False Guideline None None Security Intelligence - Site de news Américain How can highly regulated industries achieve strong authentication via mobile devices? In effort to secure sensitive data and protect critical assets, IT & Security leaders in highly regulated industries, including the US Federal government, mandate strong authentication tied to... ]]> 2018-10-24T15:30:02+00:00 https://securityintelligence.com/how-can-highly-regulated-industries-achieve-strong-authentication-via-mobile-devices/ www.secnews.physaphae.fr/article.php?IdArticle=860542 False Guideline None None Security Intelligence - Site de news Américain 6 Common Myths That Could Be Holding Back Your Cybersecurity Awareness Efforts To improve the company's overall cyber resilience posture, security leaders must promote a culture of cybersecurity awareness from the top down. They can start by debunking these six common myths. ]]> 2018-10-23T12:05:01+00:00 https://securityintelligence.com/6-common-myths-that-could-be-holding-back-your-cybersecurity-awareness-efforts/ www.secnews.physaphae.fr/article.php?IdArticle=858495 False Guideline None None Security Intelligence - Site de news Américain 5 Tips to Bring Colleagues on Board With Information Security Systems The more employees and business leaders are involved with your information security systems, the more long-term buy-in you'll have when it comes to following security policies and best practices. ]]> 2018-10-17T13:00:02+00:00 https://securityintelligence.com/5-tips-to-bring-colleagues-on-board-with-information-security-systems/ www.secnews.physaphae.fr/article.php?IdArticle=851671 False Guideline None None Security Intelligence - Site de news Américain Is Employee Negligence Threatening Your Information Security? With a little education and a lot of communication, security leaders can steadily reduce employee negligence over time through consistent, comprehensive awareness training. ]]> 2018-10-17T11:15:01+00:00 https://securityintelligence.com/is-employee-negligence-threatening-your-information-security/ www.secnews.physaphae.fr/article.php?IdArticle=851582 False Guideline None None Security Intelligence - Site de news Américain Does Your SOC Have a Security Playbook? By creating, regularly reviewing and maintaining a security playbook, SOC leaders can position analysts to execute incident response processes more quickly and effectively. ]]> 2018-10-08T12:30:02+00:00 https://securityintelligence.com/does-your-soc-have-a-security-playbook/ www.secnews.physaphae.fr/article.php?IdArticle=836635 False Guideline None None Security Intelligence - Site de news Américain How Nick Bradley Made a Career of Pursuing Bad Guys, From the Military to X-Force IRIS X-Force IRIS Practice Lead Nick Bradley was on track for an illustrious career in the military police when a computer virus detoured his path towards protection of a different kind. ]]> 2018-10-04T12:20:02+00:00 https://securityintelligence.com/how-nick-bradley-made-a-career-of-pursuing-bad-guys-from-the-military-to-x-force-iris/ www.secnews.physaphae.fr/article.php?IdArticle=830735 False Guideline None 2.0000000000000000 Security Intelligence - Site de news Américain Visibility and Control: A One-Two Punch for Securing iOS Devices in the Enterprise With many organizations now dependent on iOS devices, security leaders must balance productivity and security with the right endpoint management solution. ]]> 2018-10-03T10:00:02+00:00 https://securityintelligence.com/visibility-and-control-a-one-two-punch-for-securing-ios-devices-in-the-enterprise/ www.secnews.physaphae.fr/article.php?IdArticle=829611 False Guideline None None Security Intelligence - Site de news Américain How to Develop Next-Generation SOC Analysts, Part 1 SOC analysts don't always come with all the certifications and skills an organization needs to protect its data. How can security leaders develop these employees into passionate, dedicated analysts? ]]> 2018-09-28T11:55:01+00:00 https://securityintelligence.com/how-to-develop-next-generation-soc-analysts-part-1/ www.secnews.physaphae.fr/article.php?IdArticle=825998 False Guideline None None Security Intelligence - Site de news Américain IBM Named a Leader in \'The Forrester Wave: Identity Management And Governance, Q3 2018\' 2018-09-27T14:35:05+00:00 https://securityintelligence.com/ibm-named-a-leader-in-the-forrester-wave-identity-management-and-governance-q3-2018/ www.secnews.physaphae.fr/article.php?IdArticle=825999 False Guideline None None