www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-04T05:55:41+00:00 www.secnews.physaphae.fr Security Intelligence - Site de news Américain Taking Over the Overlay: What Triggers the AVLay Remote Access Trojan (RAT)? IBM X-Force researchers discovered, reverse engineered and reconstructed AVLay, a remote access Trojan that mixes DLL hijacking with a legitimate executable borrowed from various antivirus programs. ]]> 2019-07-02T17:01:01+00:00 https://securityintelligence.com/posts/taking-over-the-overlay-what-triggers-the-avlay-remote-access-trojan-rat/ www.secnews.physaphae.fr/article.php?IdArticle=1201939 False None None 5.0000000000000000 Security Intelligence - Site de news Américain Massachusetts Amends Data Breach Law - What to Know for Your Incident Response Strategy This update can be seen as part of a wider trend in data privacy regulations where guidelines on breach reporting and incident response documentation are becoming more specific. ]]> 2019-05-29T12:00:02+00:00 https://securityintelligence.com/massachusetts-amends-data-breach-law-what-to-know-for-your-incident-response-strategy/ www.secnews.physaphae.fr/article.php?IdArticle=1130825 False Data Breach None None Security Intelligence - Site de news Américain Third-Party Risks Need New Approaches Businesses need to adopt a strategic approach to managing third-party risks that provides an integrated view of the vendor relationship process. ]]> 2019-05-28T12:30:03+00:00 https://securityintelligence.com/third-party-risks-need-new-approaches/ www.secnews.physaphae.fr/article.php?IdArticle=1129137 False None None None Security Intelligence - Site de news Américain Interns and Social Media: A Goldmine for Hackers A social media post from one of a company's interns was all this people hacker needed to enter a secure area with a counterfeit employee badge. Learn tips for welcoming new employees securely. ]]> 2019-05-28T10:00:02+00:00 https://securityintelligence.com/interns-and-social-media-a-goldmine-for-hackers/ www.secnews.physaphae.fr/article.php?IdArticle=1128878 False None None None Security Intelligence - Site de news Américain HawkEye Malware Operators Renew Attacks on Business Users IBM X-Force researchers report an increase in HawkEye v9 keylogger infection campaigns targeting businesses around the world. ]]> 2019-05-27T12:35:02+00:00 https://securityintelligence.com/hawkeye-malware-operators-renew-attacks-on-business-users/ www.secnews.physaphae.fr/article.php?IdArticle=1127540 False Malware None None Security Intelligence - Site de news Américain Is Your Company Culture Seamlessly Secure - or Just Stressful? As security practitioners, we probably have a good grasp of technological controls. But adversarial company culture may be creating stress that keeps people from protecting our data. ]]> 2019-05-27T11:00:02+00:00 https://securityintelligence.com/is-your-company-culture-seamlessly-secure-or-just-stressful/ www.secnews.physaphae.fr/article.php?IdArticle=1127408 False None None None Security Intelligence - Site de news Américain Secure Your Hybrid Cloud Environment With Visibility, Control and Flexibility When it is implemented correctly, hybrid cloud data protection enables organizations to safeguard critical data across their choice of on-premises, public and/or private cloud services. ]]> 2019-05-24T11:00:03+00:00 https://securityintelligence.com/posts/secure-your-hybrid-cloud-environment-with-visibility-control-and-flexibility/ www.secnews.physaphae.fr/article.php?IdArticle=1123029 False None None 5.0000000000000000 Security Intelligence - Site de news Américain How Would You React? What \'Killing Eve\' Can Teach Us About Social Engineering 2019-05-24T11:00:02+00:00 https://securityintelligence.com/articles/how-would-you-react-what-killing-eve-can-teach-us-about-social-engineering/ www.secnews.physaphae.fr/article.php?IdArticle=1123030 False Threat None None Security Intelligence - Site de news Américain Uncover Modern Identity and Access Management (IAM) Challenges With Enterprise Design Thinking Identity and access management (IAM) has become increasingly challenging due to the complexity of more devices, applications, information, users and data privacy regulations. ]]> 2019-05-23T14:31:03+00:00 https://securityintelligence.com/posts/uncover-modern-identity-and-access-management-iam-challenges-with-enterprise-design-thinking/ www.secnews.physaphae.fr/article.php?IdArticle=1121499 False None None 5.0000000000000000 Security Intelligence - Site de news Américain In Light of Ever-Increasing Cybersecurity Risks, Boards Must Deepen Their Oversight and Engagement In light of a regulatory landscape that is becoming more complex and costly, boards need better insight into the organization's risk exposure and its ability to handle cybersecurity risks. ]]> 2019-05-23T12:00:01+00:00 https://securityintelligence.com/in-light-of-ever-increasing-cybersecurity-risks-boards-must-deepen-their-oversight-and-engagement/ www.secnews.physaphae.fr/article.php?IdArticle=1121159 False None None None Security Intelligence - Site de news Américain The Cybersecurity Industry\'s Third-Party Risk Management Problem Is Rooted in Visibility 2019-05-22T13:00:02+00:00 https://securityintelligence.com/the-cybersecurity-industrys-third-party-risk-management-problem-is-rooted-in-visibility/ www.secnews.physaphae.fr/article.php?IdArticle=1119535 False None None 4.0000000000000000 Security Intelligence - Site de news Américain Here\'s Why More Security Solutions Doesn\'t Equal Better Security 2019-05-22T11:30:02+00:00 https://securityintelligence.com/heres-why-more-security-solutions-doesnt-equal-better-security/ www.secnews.physaphae.fr/article.php?IdArticle=1119424 False Threat None None Security Intelligence - Site de news Américain How Cyber-Secure Are Business Travelers? New Report Says Not Very I know that open Wi-Fi is sometimes better than no Wi-Fi, which is why I always use a VPN when connecting to public networks. But not all business travelers are so careful, according to a new report. ]]> 2019-05-21T10:00:02+00:00 https://securityintelligence.com/how-cyber-secure-are-business-travelers-new-report-says-not-very/ www.secnews.physaphae.fr/article.php?IdArticle=1117725 False None None None Security Intelligence - Site de news Américain How to Fight Back Against Macro Malware Per X-Force IRIS, at least 22 percent of reported campaigns in April 2019 delivered macro malware. What methods can defenders leverage to help detect malicious macro activity? ]]> 2019-05-20T11:00:02+00:00 https://securityintelligence.com/how-to-fight-back-against-macro-malware/ www.secnews.physaphae.fr/article.php?IdArticle=1116278 False Malware None None Security Intelligence - Site de news Américain Hunt With Intention: Why You Should Adopt Threat Hunting and How to Get Started Hackers today are more sophisticated and coordinated than the dark, hooded figures often portrayed in movies. Threat hunting is critical to spot threats before they cause damage on the network. ]]> 2019-05-17T15:20:02+00:00 https://securityintelligence.com/hunt-with-intention-why-you-should-adopt-threat-hunting-and-how-to-get-started/ www.secnews.physaphae.fr/article.php?IdArticle=1112593 False Threat None 2.0000000000000000 Security Intelligence - Site de news Américain The Decline of Hacktivism: Attacks Drop 95 Percent Since 2015 Despite the rise in vulnerability reporting, cryptojacking attacks and attacks on critical infrastructure, one threat trend has been on the decline: hacktivism. Where have all the hacktivists gone? ]]> 2019-05-16T12:00:02+00:00 https://securityintelligence.com/the-decline-of-hacktivism-attacks-drop-95-percent-since-2015/ www.secnews.physaphae.fr/article.php?IdArticle=1110232 False Vulnerability,Threat None None Security Intelligence - Site de news Américain Get Ahead of Cybersecurity AI Maturation by Building a Cognitive SOC Cybersecurity AI is approaching maturity. Are you prepared to defend against a new wave adversarial machine learning risks? ]]> 2019-05-15T19:30:02+00:00 https://securityintelligence.com/articles/get-ahead-of-cybersecurity-ai-maturation-by-building-a-cognitive-soc/ www.secnews.physaphae.fr/article.php?IdArticle=1109061 False None None 2.0000000000000000 Security Intelligence - Site de news Américain Security Awareness Training Should Always Lead to Changes in Behavior It's important to recognize that a core outcome of security awareness and training efforts needs to be changing behaviors. ]]> 2019-05-14T14:00:04+00:00 https://securityintelligence.com/security-awareness-training-should-always-lead-to-changes-in-behavior/ www.secnews.physaphae.fr/article.php?IdArticle=1106717 False None None None Security Intelligence - Site de news Américain Meanwhile at the Plant…The Realities of Operational Security in the Age of Connected Machines As OT environments, especially with legacy systems in place, become increasingly connected, they may inherit OT security risks that were previously the domain of the IT environment. ]]> 2019-05-13T15:15:02+00:00 https://securityintelligence.com/posts/meanwhile-at-the-plantthe-realities-of-operational-security-in-the-age-of-connected-machines/ www.secnews.physaphae.fr/article.php?IdArticle=1105446 False None None None Security Intelligence - Site de news Américain How a Quirky Gmail Feature Led to a Phishing Scare and a Valuable Lesson in Email Security What began as a moment of panic in the wake of what I thought was a phishing attempt ended up being a valuable lesson about a quirky Gmail feature and how it impacts the email security landscape. ]]> 2019-05-13T12:00:04+00:00 https://securityintelligence.com/how-a-quirky-gmail-feature-led-to-a-phishing-scare-and-a-valuable-lesson-in-email-security/ www.secnews.physaphae.fr/article.php?IdArticle=1105032 False None None 4.0000000000000000 Security Intelligence - Site de news Américain NIST Proposes Privacy Framework to Help Make Sense of Global Privacy Regulations Organizations that approach privacy regulations strategically stand to gain a competitive edge when it comes to building and retaining customer trust. ]]> 2019-05-13T12:00:02+00:00 https://securityintelligence.com/nist-proposes-privacy-framework-to-help-make-sense-of-global-privacy-regulations/ www.secnews.physaphae.fr/article.php?IdArticle=1105033 False None None None Security Intelligence - Site de news Américain 4 Information Security Slipups From \'Star Trek: Discovery\' to Avoid in the Enterprise 2019-05-10T11:00:02+00:00 https://securityintelligence.com/4-information-security-slipups-from-star-trek-discovery-to-avoid-in-the-enterprise/ www.secnews.physaphae.fr/article.php?IdArticle=1101977 False None None None Security Intelligence - Site de news Américain Measuring the Value of Your Unified Endpoint Management (UEM) Investment According to Forrester, unified enpoint management enables customers to initiate a low-touch, no-touch process that reduces the time and effort needed to configure endpoints by as much as 96 percent. ]]> 2019-05-09T11:00:02+00:00 https://securityintelligence.com/measuring-the-value-of-your-unified-endpoint-management-uem-investment/ www.secnews.physaphae.fr/article.php?IdArticle=1100283 False None None None Security Intelligence - Site de news Américain Beyond 2FA: Secure Your Critical Assets With Risk-Based Multifactor Authentication Passwords have become an insecure and cumbersome form of authentication. Learn about risk-based multifactor authentication, an approach to access management that uses context to determine risk. ]]> 2019-05-08T13:00:02+00:00 https://securityintelligence.com/beyond-2fa-secure-your-critical-assets-with-risk-based-multifactor-authentication/ www.secnews.physaphae.fr/article.php?IdArticle=1098326 False None None None Security Intelligence - Site de news Américain AppSec Insights From Think 2019: Four Steps to Optimize Your Application Security Program Whether you're a small startup or an international enterprise, a successful application security program involves more than just scanning for vulnerabilities. ]]> 2019-05-08T12:30:04+00:00 https://securityintelligence.com/appsec-insights-from-think-2019-four-steps-to-optimize-your-application-security-program/ www.secnews.physaphae.fr/article.php?IdArticle=1098327 False None None None Security Intelligence - Site de news Américain Putting the \'S\' in IoT: How to Make Internet of Things Solutions Secure by Design 2019-05-07T13:35:01+00:00 https://securityintelligence.com/posts/putting-the-s-in-iot-how-to-make-internet-of-things-solutions-secure-by-design/ www.secnews.physaphae.fr/article.php?IdArticle=1098121 False None None 4.0000000000000000 Security Intelligence - Site de news Américain How to Make Third-Party Risk Management Second Nature Organizations that sleep on third-party risk management could unknowingly expose their systems to remote attacks, access risks and more. ]]> 2019-05-07T12:30:02+00:00 https://securityintelligence.com/how-to-make-third-party-risk-management-second-nature/ www.secnews.physaphae.fr/article.php?IdArticle=1098122 False None None 5.0000000000000000 Security Intelligence - Site de news Américain Why You Should Constantly Enrich Security Culture Throughout Your Organization Here's what you need to know about organizational security culture - and how to plan for and inspire a better one. ]]> 2019-05-06T12:00:02+00:00 https://securityintelligence.com/articles/why-you-should-constantly-enrich-security-culture-throughout-your-organization/ www.secnews.physaphae.fr/article.php?IdArticle=1097446 False None None None Security Intelligence - Site de news Américain High Stakes, Rising Risks: The Ripple Effects of Cybersecurity in the Healthcare Sector Is providing effective cybersecurity for the healthcare sector an IT problem or a wider-scope issue? The short answer is that it's both. ]]> 2019-05-06T11:00:02+00:00 https://securityintelligence.com/posts/high-stakes-rising-risks-the-ripple-effects-of-cybersecurity-in-the-healthcare-sector/ www.secnews.physaphae.fr/article.php?IdArticle=1097447 False None None None Security Intelligence - Site de news Américain Published Exploits for Accessing SAP Systems Put Security Teams on Alert Researchers published two pieces of exploit code that can allow anyone to interact with an organization's SAP enterprise resource planning platform and perform unauthorized transactions. ]]> 2019-05-02T16:00:02+00:00 https://securityintelligence.com/posts/published-exploits-for-accessing-sap-systems-put-security-teams-on-alert/ www.secnews.physaphae.fr/article.php?IdArticle=1097448 False None None None Security Intelligence - Site de news Américain Exploring Ponemon Data: After 4 Years, Is Security Satiated With False Confidence? The "2019 Ponemon Institute Study on the Cyber Resilient Organization" found that although security leaders are more confident in their cyber resilience, they are still overlooking critical areas. ]]> 2019-05-02T13:55:02+00:00 https://securityintelligence.com/posts/exploring-ponemon-data-after-4-years-is-security-satiated-with-false-confidence/ www.secnews.physaphae.fr/article.php?IdArticle=1097449 False Guideline None None Security Intelligence - Site de news Américain Everything Is Best When It Comes to Cybersecurity Best Practices How can security professionals keep up with cybersecurity best practices without taking too much time away from other responsibilities? ]]> 2019-05-02T13:45:01+00:00 https://securityintelligence.com/articles/everything-is-best-when-it-comes-to-cybersecurity-best-practices/ www.secnews.physaphae.fr/article.php?IdArticle=1097450 False None None None Security Intelligence - Site de news Américain Are Companies Doing Enough to Secure PII? I Spoke With Security Expert Frank Abagnale to Find Out 2019-05-01T15:15:02+00:00 https://securityintelligence.com/articles/are-companies-doing-enough-to-secure-pii-i-spoke-with-security-expert-frank-abagnale-to-find-out/ www.secnews.physaphae.fr/article.php?IdArticle=1097451 False None None None Security Intelligence - Site de news Américain Penetration Testing Versus Red Teaming: Clearing the Confusion There is some confusion in cybersecurity as to the difference between penetration testing and red teaming. Since all businesses have vastly different security needs, the distinction is critical. ]]> 2019-05-01T12:00:03+00:00 https://securityintelligence.com/posts/penetration-testing-versus-red-teaming-clearing-the-confusion/ www.secnews.physaphae.fr/article.php?IdArticle=1097452 False None None None Security Intelligence - Site de news Américain Facial Recognition, Deepfakes and Biometric PII: Preparing for a Future of Faceless Threats As facial recognition technology advances, bad actors will have more biometric data with which to create deepfake images, videos, sounds and more. Is the security community prepared for this threat? ]]> 2019-04-29T14:15:02+00:00 https://securityintelligence.com/facial-recognition-deepfakes-and-biometric-pii-preparing-for-a-future-of-faceless-threats/ www.secnews.physaphae.fr/article.php?IdArticle=1096740 False None None None Security Intelligence - Site de news Américain 5G Will Change How We Manage Mobile Security - Here\'s How to Start Preparing 2019-04-29T12:00:03+00:00 https://securityintelligence.com/5g-will-change-how-we-manage-mobile-security-heres-how-to-start-preparing/ www.secnews.physaphae.fr/article.php?IdArticle=1096463 False None None None Security Intelligence - Site de news Américain Why You Need a Healthy Mix of Security Analytics to Investigate Threats Effective threat management requires security teams to combine various sources of security analytics with machine-generated data to investigate incidents with speed and accuracy. ]]> 2019-04-26T12:30:03+00:00 https://securityintelligence.com/posts/why-you-need-a-healthy-mix-of-security-analytics-to-investigate-threats/ www.secnews.physaphae.fr/article.php?IdArticle=1095456 False Threat None None Security Intelligence - Site de news Américain Rethinking the Industry\'s Approach to the Cybersecurity Skills Gap 2019-04-26T11:30:02+00:00 https://securityintelligence.com/articles/rethinking-the-industrys-approach-to-the-cybersecurity-skills-gap/ www.secnews.physaphae.fr/article.php?IdArticle=1095457 False None None None Security Intelligence - Site de news Américain Zero Trust: Why Your Most Privileged Users Could Be Your Biggest Security Weakness Organizations that do not apply the zero trust model to protecting privileged users open themselves up to attacks by threat actors looking to access sensitive systems and networks. ]]> 2019-04-25T12:50:01+00:00 https://securityintelligence.com/posts/zero-trust-why-your-most-privileged-users-could-be-your-biggest-security-weakness/ www.secnews.physaphae.fr/article.php?IdArticle=1095458 False Threat None None Security Intelligence - Site de news Américain Set Expectations and Boundaries With Your Security Program to Minimize Risk Good communication, clear expectations and enforced boundaries are all key to the success of your security program. ]]> 2019-04-25T12:45:01+00:00 https://securityintelligence.com/articles/set-expectations-and-boundaries-with-your-security-program-to-minimize-risk/ www.secnews.physaphae.fr/article.php?IdArticle=1095459 False None None None Security Intelligence - Site de news Américain Industrial Control Systems Security: To Test or Not to Test? According to X-Force Red data, the number of vulnerabilities exposing industrial control systems has increased 83 percent since 2011. Should organizations test them and risk destabilizing operations? ]]> 2019-04-25T10:00:04+00:00 https://securityintelligence.com/posts/industrial-control-systems-security-to-test-or-not-to-test/ www.secnews.physaphae.fr/article.php?IdArticle=1095460 False None None None Security Intelligence - Site de news Américain Don\'t Let Vulnerabilities Leave You Taxed - Refund Customer Trust With Application Security 2019-04-24T12:00:02+00:00 https://securityintelligence.com/posts/dont-let-vulnerabilities-leave-you-taxed-refund-customer-trust-with-application-security/ www.secnews.physaphae.fr/article.php?IdArticle=1095461 False None None None Security Intelligence - Site de news Américain Long Live the Password - Even if You Don\'t Want It To 2019-04-24T11:00:02+00:00 https://securityintelligence.com/posts/long-live-the-password-even-if-you-dont-want-it-to/ www.secnews.physaphae.fr/article.php?IdArticle=1095462 False None None None Security Intelligence - Site de news Américain Mobile Security Risks Are on the Rise, But Employers Continue to Cut Corners While smartphones and tablets have become more ubiquitous in the workplace, organizations are flat out ignoring mobile security risks. ]]> 2019-04-23T12:00:02+00:00 https://securityintelligence.com/articles/mobile-security-risks-are-on-the-rise-but-employers-continue-to-cut-corners/ www.secnews.physaphae.fr/article.php?IdArticle=1095463 False None None None Security Intelligence - Site de news Américain How IBM X-Force IRIS Prepared for the Ukraine Election Before the first round of the Ukraine election in March, we decided that we couldn't afford to sit on our heels until an attack was launched. ]]> 2019-04-23T10:00:02+00:00 https://securityintelligence.com/posts/how-ibm-x-force-iris-prepared-for-the-ukraine-election/ www.secnews.physaphae.fr/article.php?IdArticle=1095464 False None None None Security Intelligence - Site de news Américain What\'s the Best Way to Build Digital Trust? Show Your Customers You Care About Their Data Privacy 2019-04-22T12:50:02+00:00 https://securityintelligence.com/posts/whats-the-best-way-to-build-digital-trust-show-your-customers-you-care-about-their-data-privacy/ www.secnews.physaphae.fr/article.php?IdArticle=1095465 False None None None Security Intelligence - Site de news Américain Mobile Security Versus Desktop and Laptop Security: Is There Even a Difference Anymore? Do you remember your first mobile phone, and the newfound feelings of connectedness and convenience that came with it? Nowadays, are these devices really phones or are they computers? Labels matter. ]]> 2019-04-19T12:00:02+00:00 https://securityintelligence.com/mobile-security-versus-desktop-and-laptop-security-is-there-even-a-difference-anymore/ www.secnews.physaphae.fr/article.php?IdArticle=1094439 False None None None Security Intelligence - Site de news Américain In Such Transformative Times, the CISO Is Key to Delivering Digital Trust Ensuring organizations adapt while also retaining a high level of digital trust is exactly where the chief information security officer (CISO) can help. ]]> 2019-04-18T12:30:04+00:00 https://securityintelligence.com/in-such-transformative-times-the-ciso-is-key-to-delivering-digital-trust/ www.secnews.physaphae.fr/article.php?IdArticle=1094161 False None None 4.0000000000000000 Security Intelligence - Site de news Américain Level Up Security Operations With Threat Intelligence Cheat Codes Like the video game industry, security has shifted toward unified platforms, and contextual threat intelligence is the cheat code SOC teams need to defeat the bosses standing in the way of security. ]]> 2019-04-18T12:30:02+00:00 https://securityintelligence.com/level-up-security-operations-with-threat-intelligence-cheat-codes/ www.secnews.physaphae.fr/article.php?IdArticle=1094162 False Threat None 2.0000000000000000 Security Intelligence - Site de news Américain Challenges and Opportunities to Close the Cybersecurity Gap in the Financial Services Industry For the financial services industry, being transparent and demonstrating a mature, integrated business and security model is critical to build trust in today's evolving threat landscape. ]]> 2019-04-18T11:00:02+00:00 https://securityintelligence.com/challenges-and-opportunities-to-close-the-cybersecurity-gap-in-the-financial-services-industry/ www.secnews.physaphae.fr/article.php?IdArticle=1094163 False Threat None None Security Intelligence - Site de news Américain Automation in Cyber Resilient Organizations: Key Findings From 2019 Ponemon Study A recent Ponemon study revealed a set of habits and practices that the most cyber resilient organizations undertake, such as adopting automation for tasks that don't require human oversight. ]]> 2019-04-17T19:40:02+00:00 https://securityintelligence.com/automation-in-cyber-resilient-organizations-key-findings-from-2019-ponemon-study/ www.secnews.physaphae.fr/article.php?IdArticle=1094164 False None None None Security Intelligence - Site de news Américain How to Defend Your Organization Against Fileless Malware Attacks Fighting fileless malware attacks will take some serious effort and careful coordination among a variety of tools and techniques. ]]> 2019-04-17T12:45:01+00:00 https://securityintelligence.com/how-to-defend-your-organization-against-fileless-malware-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=1094165 False Malware None None Security Intelligence - Site de news Américain What Is Endpoint Security Today? Big Data and Mobile Trends Point to the \'Startpoint\' 2019-04-16T12:30:03+00:00 https://securityintelligence.com/what-is-endpoint-security-today-big-data-and-mobile-trends-point-to-the-startpoint/ www.secnews.physaphae.fr/article.php?IdArticle=1094166 False None None None Security Intelligence - Site de news Américain KuppingerCole Report: Leadership Compass of Access Management and Federation IBM Security Access Manager (ISAM) is rated as a leader in the Product, Marketing and Technology Leadership categories in KuppingerCole's Leadership Compass report on access management and federation. ]]> 2019-04-15T18:50:02+00:00 https://securityintelligence.com/kuppingercole-report-leadership-compass-of-access-management-and-federation/ www.secnews.physaphae.fr/article.php?IdArticle=1094167 False Guideline None None Security Intelligence - Site de news Américain What Is the Role of SIEM in the Fusion Center Era? A fusion center uses a wider set of data sources, collects data from both inside and outside the organization, and delivers it to the right people to help them respond and recover more efficiently. ]]> 2019-04-12T12:45:01+00:00 https://securityintelligence.com/what-is-the-role-of-siem-in-the-fusion-center-era/ www.secnews.physaphae.fr/article.php?IdArticle=1093187 False None None None Security Intelligence - Site de news Américain What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores? To avoid malware, always get hardware and software from authorized and reputable sources and vendors, right? But what happens when those same sources actually contain or deliver malicious payloads? ]]> 2019-04-12T12:00:02+00:00 https://securityintelligence.com/what-happens-when-malware-sneaks-into-reputable-hardware-applications-and-app-stores/ www.secnews.physaphae.fr/article.php?IdArticle=1093188 False Malware None None Security Intelligence - Site de news Américain Dark Web TLS/SSL Certificates Highlight Need for Shift to Zero Trust Security Some of the latest website security threats originate from thriving dark web marketplaces for TLS/SSL certificates, which often come packaged with other cybercrime services. ]]> 2019-04-11T13:00:02+00:00 https://securityintelligence.com/dark-web-tls-ssl-certificates-highlight-need-for-shift-to-zero-trust-security/ www.secnews.physaphae.fr/article.php?IdArticle=1093189 False None None None Security Intelligence - Site de news Américain Cyber Resilience Study: Incident Response Plans and Security Automation Set High Performers Apart The fourth annual "The Cyber Resilience Organization" study found that 23 percent of respondents are now using security automation. ]]> 2019-04-11T12:00:02+00:00 https://securityintelligence.com/cyber-resilience-study-incident-response-plans-and-security-automation-set-high-performers-apart/ www.secnews.physaphae.fr/article.php?IdArticle=1093190 False None None None Security Intelligence - Site de news Américain How to Balance Speed and Security in Your Application Security Program To compete in today's software market, developers are under pressure to build quality code quickly. But DevOps processes that fail to account for application security are bound to miss critical flaws. ]]> 2019-04-10T12:00:03+00:00 https://securityintelligence.com/how-to-balance-speed-and-security-in-your-application-security-program/ www.secnews.physaphae.fr/article.php?IdArticle=1092036 False None None None Security Intelligence - Site de news Américain Rewrite the Rules to Reduce Complexity in Your Security Architecture At RSAC 2019, Sridhar Muppidi and Devin Somppi implored vendors to "start looking at security as a team sport" and redouble their efforts to reduce complexity in their security architecture. ]]> 2019-04-10T12:00:02+00:00 https://securityintelligence.com/rewrite-the-rules-to-reduce-complexity-in-your-security-architecture/ www.secnews.physaphae.fr/article.php?IdArticle=1091909 False None None None Security Intelligence - Site de news Américain Credential Dumping Campaign Hits Multinational Corporations X-Force researchers observed attackers targeting multinational corporations in various sectors using malicious scripts to automate attacks on misconfigured servers. ]]> 2019-04-09T19:20:03+00:00 https://securityintelligence.com/credential-dumping-campaign-hits-multinational-corporations/ www.secnews.physaphae.fr/article.php?IdArticle=1091910 False None None None Security Intelligence - Site de news Américain SOAR: The Second Arm of Security Operations SIEM tools can help security operations center (SOC) teams detect threats, but what good is threat data without the context analysts need to quickly respond to incidents? That's where SOAR comes in. ]]> 2019-04-09T12:00:03+00:00 https://securityintelligence.com/soar-the-second-arm-of-security-operations/ www.secnews.physaphae.fr/article.php?IdArticle=1091911 False Threat None None Security Intelligence - Site de news Américain Is Cloud Business Moving too Fast for Cloud Security? Businesses that want to advance cloud security at scale need to invest in both the people and the technology that will reduce risks. ]]> 2019-04-09T12:00:02+00:00 https://securityintelligence.com/is-cloud-business-moving-too-fast-for-cloud-security/ www.secnews.physaphae.fr/article.php?IdArticle=1091912 False None None None Security Intelligence - Site de news Américain Why Encryption Is the Cornerstone of Your Cloud Security When evaluating cloud providers, it's important to understand who is responsible for cloud security. Since the lines are often blurred, encryption is imperative to keep your data from prying eyes. ]]> 2019-04-08T12:00:02+00:00 https://securityintelligence.com/why-encryption-is-the-cornerstone-of-your-cloud-security/ www.secnews.physaphae.fr/article.php?IdArticle=1091913 False None None None Security Intelligence - Site de news Américain Cybercriminals Spoof Major Accounting and Payroll Firms in Tax Season Malware Campaigns 2019-04-08T10:00:05+00:00 https://securityintelligence.com/cybercriminals-spoof-major-accounting-and-payroll-firms-in-tax-season-malware-campaigns/ www.secnews.physaphae.fr/article.php?IdArticle=1091914 False Malware None None Security Intelligence - Site de news Américain Buffer Overflow Vulnerability in TP-Link Routers Can Allow Remote Attackers to Take Control IBM X-Force found a zero-day buffer overflow vulnerability in one of the most common routers on the market that could let malicious third parties take control of the device from a remote location. ]]> 2019-04-08T10:00:03+00:00 https://securityintelligence.com/buffer-overflow-vulnerability-in-tp-link-routers-can-allow-remote-attackers-to-take-control/ www.secnews.physaphae.fr/article.php?IdArticle=1091915 False Vulnerability None None Security Intelligence - Site de news Américain Cryptojacking Attacks: Who\'s Mining on Your Coin? 2019-04-05T11:45:04+00:00 https://securityintelligence.com/cryptojacking-attacks-whos-mining-on-your-coin/ www.secnews.physaphae.fr/article.php?IdArticle=1090609 False Malware None None Security Intelligence - Site de news Américain Preparing for the CCPA: Leverage GDPR Investments to Accelerate Readiness To prepare for the CCPA and other upcoming data privacy regulations, start by applying the best practices and frameworks you used to achieve GDPR readiness when the regulation took effect last May. ]]> 2019-04-05T11:45:03+00:00 https://securityintelligence.com/preparing-for-the-ccpa-leverage-gdpr-investments-to-accelerate-readiness/ www.secnews.physaphae.fr/article.php?IdArticle=1090610 False None None None Security Intelligence - Site de news Américain Stressed to Impress: Evolving Threats Raise the Stakes on Shared Security Culture Shared security culture is now critical for organizations to prevent IT burnout and respond to emerging threats. But what does this look like in practice? ]]> 2019-04-05T11:45:01+00:00 https://securityintelligence.com/stressed-to-impress-evolving-threats-raise-the-stakes-on-shared-security-culture/ www.secnews.physaphae.fr/article.php?IdArticle=1090611 False None None None Security Intelligence - Site de news Américain Why Cyber Range Training Should Be Top of Mind for Your Security Teams When reputation, revenue and customer trust is at stake, immersive cyber range training can help security teams detect, respond and manage incidents effectively. ]]> 2019-04-05T11:00:02+00:00 https://securityintelligence.com/why-cyber-range-training-should-be-top-of-mind-for-your-security-teams/ www.secnews.physaphae.fr/article.php?IdArticle=1090475 False None None None Security Intelligence - Site de news Américain How a Cunning Remote Overlay Malware Met Its Match A remote overlay malware that is attacking Latin American banks met its match in a solution built from behavioral biometrics, deep research, reverse engineering and finely tuned threat modeling. ]]> 2019-04-04T15:20:03+00:00 https://securityintelligence.com/how-a-cunning-remote-overlay-malware-met-its-match/ www.secnews.physaphae.fr/article.php?IdArticle=1089122 False Malware,Threat None None Security Intelligence - Site de news Américain Preparing for the Unpredictable: Security in a New World of Mobile Malware Mobile malware is nothing new. But in recent months, attackers have been getting more creative and resourceful with how they conceal, distribute and deploy these threats. ]]> 2019-04-04T14:40:01+00:00 https://securityintelligence.com/preparing-for-the-unpredictable-security-in-a-new-world-of-mobile-malware/ www.secnews.physaphae.fr/article.php?IdArticle=1088986 False Malware None 2.0000000000000000 Security Intelligence - Site de news Américain IcedID Banking Trojan Spruces Up Injection Tactics to Add Stealth IBM X-Force analyzed modifications made to IcedID that help the banking Trojan act more stealthily on infected devices. ]]> 2019-04-04T12:45:04+00:00 https://securityintelligence.com/icedid-banking-trojan-spruces-up-injection-tactics-to-add-stealth/ www.secnews.physaphae.fr/article.php?IdArticle=1088741 False None None None Security Intelligence - Site de news Américain Capture the Flag Competitions Can Help Close the Security Skills Gap A capture the flag exercise gives security professionals and business leaders an opportunity to drill their cybersecurity response skills in a low-pressure yet highly engaging environment. ]]> 2019-04-04T12:00:02+00:00 https://securityintelligence.com/capture-the-flag-competitions-can-help-close-the-security-skills-gap/ www.secnews.physaphae.fr/article.php?IdArticle=1088621 False Guideline None None Security Intelligence - Site de news Américain Reap the Promise of One and Done Authentication With SSO With SSO, employees can use one set of credentials to access all their apps instead of remembering, looking up and frequently resetting multiple passwords. ]]> 2019-04-03T14:15:02+00:00 https://securityintelligence.com/reap-the-promise-of-one-and-done-authentication-with-sso/ www.secnews.physaphae.fr/article.php?IdArticle=1087579 False None None None Security Intelligence - Site de news Américain To Move Forward Securely, Look Backward With Ongoing Risk Assessments If we focus on the future at the expense of performing risk assessments to maintain defenses against existing threats, we will always be one step behind attackers. ]]> 2019-04-02T11:30:02+00:00 https://securityintelligence.com/to-move-forward-securely-look-backward-with-ongoing-risk-assessments/ www.secnews.physaphae.fr/article.php?IdArticle=1087580 False None None None Security Intelligence - Site de news Américain Security Analyst Files Workman\'s Comp Claim for \'Seriously Fatigued Fingers\' 2019-04-01T13:00:02+00:00 https://securityintelligence.com/security-analyst-files-workmans-comp-claim-for-seriously-fatigued-fingers/ www.secnews.physaphae.fr/article.php?IdArticle=1087581 False None None None Security Intelligence - Site de news Américain The US Is Slow to Adopt EHRs, But That Might Actually Be a Good Thing for Healthcare Security Healthcare security is going to play a huge role if the utopian vision of a purely digital healthcare ecosystem is going to be realized. ]]> 2019-04-01T11:00:02+00:00 https://securityintelligence.com/the-us-is-slow-to-adopt-ehrs-but-that-might-actually-be-a-good-thing-for-healthcare-security/ www.secnews.physaphae.fr/article.php?IdArticle=1087582 False None None None Security Intelligence - Site de news Américain The Language of Business: Where the Board of Directors and Security Leaders Can Meet IT and security professionals must be able to talk business to the C-suite and the board of directors, especially if new security products need to be added into the organization's portfolio. ]]> 2019-03-29T13:05:01+00:00 https://securityintelligence.com/the-language-of-business-where-the-board-of-directors-and-security-leaders-can-meet/ www.secnews.physaphae.fr/article.php?IdArticle=1086939 False None None None Security Intelligence - Site de news Américain How Chris Thomas Paired His Passion for Blockchain With Pen Testing Chris Thomas, X-Force Red's blockchain security expert, has always had an interest in understanding how technologies are built and operated. ]]> 2019-03-29T12:00:03+00:00 https://securityintelligence.com/how-chris-thomas-paired-his-passion-for-blockchain-with-pen-testing/ www.secnews.physaphae.fr/article.php?IdArticle=1086804 False None None None Security Intelligence - Site de news Américain Foster a Culture of Knowledge Sharing in Your Security Operations Center To bridge the skills gap, increase efficiency and lighten the load of overwhelmed analysts, it's imperative to encourage knowledge sharing among your security operations center team. ]]> 2019-03-29T12:00:02+00:00 https://securityintelligence.com/foster-a-culture-of-knowledge-sharing-in-your-security-operations-center/ www.secnews.physaphae.fr/article.php?IdArticle=1086671 False None None None Security Intelligence - Site de news Américain A Busy IT Infrastructure Can Lead to Security Disaster Smartphones, tablets and cloud computing have been leading the way in the workplace until now, but the growing popularity of the internet of things could totally change the look of IT infrastructure. ]]> 2019-03-29T11:00:02+00:00 https://securityintelligence.com/a-busy-it-infrastructure-can-lead-to-security-disaster/ www.secnews.physaphae.fr/article.php?IdArticle=1086555 False Guideline None None Security Intelligence - Site de news Américain Speak the Board\'s Language to Communicate the Value of Security 2019-03-28T16:30:03+00:00 https://securityintelligence.com/speak-the-boards-language-to-communicate-the-value-of-security/ www.secnews.physaphae.fr/article.php?IdArticle=1085597 False None None None Security Intelligence - Site de news Américain Let\'s Make 2019 the Year of Fewer Records Compromised in Data Breaches 2019-03-28T16:30:02+00:00 https://securityintelligence.com/lets-make-2019-the-year-of-fewer-records-compromised-in-data-breaches/ www.secnews.physaphae.fr/article.php?IdArticle=1085598 False None None None Security Intelligence - Site de news Américain Missed DNS Flag Day? It\'s Not Too Late to Upgrade Your Domain Security 2019-03-27T13:00:02+00:00 https://securityintelligence.com/missed-dns-flag-day-its-not-too-late-to-upgrade-your-domain-security/ www.secnews.physaphae.fr/article.php?IdArticle=1083518 False None None None Security Intelligence - Site de news Américain Here\'s What You Need to Know to Secure Your IoT Projects 2019-03-27T12:40:02+00:00 https://securityintelligence.com/heres-what-you-need-to-know-to-secure-your-iot-projects/ www.secnews.physaphae.fr/article.php?IdArticle=1083420 False None None None Security Intelligence - Site de news Américain When It Comes to Incident Response, Failing to Plan Means Planning to Fail In today's treacherous threat landscape, it seems the odds are overwhelmingly stacked against cyberdefenders. But there is one advantage attackers can't take away: thorough incident response planning. ]]> 2019-03-26T17:00:02+00:00 https://securityintelligence.com/when-it-comes-to-incident-response-failing-to-plan-means-planning-to-fail/ www.secnews.physaphae.fr/article.php?IdArticle=1082274 False Threat None None Security Intelligence - Site de news Américain How to Lift the Veil on Mobile Application Security Threats Today's security leaders are tasked with complying with data privacy laws and enhancing user productivity while preserving their agility and securing them from mobile application security threats. ]]> 2019-03-26T12:30:02+00:00 https://securityintelligence.com/how-to-lift-the-veil-on-mobile-application-security-threats/ www.secnews.physaphae.fr/article.php?IdArticle=1081856 False Guideline None None Security Intelligence - Site de news Américain Adopting the NIST 800-53 Control Framework? Learn More About the Anticipated Changes in 2019 Organizations adopting NIST 800-53 should understand how upcoming changes will affect senior leadership accountability, data privacy and third-party assessments. ]]> 2019-03-25T16:40:02+00:00 https://securityintelligence.com/adopting-the-nist-800-53-control-framework-learn-more-about-the-anticipated-changes-in-2019/ www.secnews.physaphae.fr/article.php?IdArticle=1080853 False Guideline None None Security Intelligence - Site de news Américain Think Inside the Box to Bridge the Cybersecurity Skills Gap The threat landscape is growing more perilous each day and our white hats need all the help they can get. The problem is that many organizations are struggling to close the cybersecurity skills gap. ]]> 2019-03-25T12:10:02+00:00 https://securityintelligence.com/think-inside-the-box-to-bridge-the-cybersecurity-skills-gap/ www.secnews.physaphae.fr/article.php?IdArticle=1080854 False Threat None None Security Intelligence - Site de news Américain Taming Global Cybersecurity Risks Requires a Concerted Cyber Resilience Effort With the realization that "we're all in this together," boards want to learn how their organizations are collaborating with the rest of the ecosystem in planning and testing cyber resilience. ]]> 2019-03-22T13:00:03+00:00 https://securityintelligence.com/taming-global-cybersecurity-risks-requires-a-concerted-cyber-resilience-effort/ www.secnews.physaphae.fr/article.php?IdArticle=1076773 False None None None Security Intelligence - Site de news Américain 5 Characteristics of an Effective Incident Response Team: Lessons From the Front Line How you respond to a data breach matters. What qualities do the most elite incident response teams possess? The IBM X-Force IRIS team shares its lessons from the front line. ]]> 2019-03-21T20:26:01+00:00 https://securityintelligence.com/5-characteristics-of-an-effective-incident-response-team-lessons-from-the-front-line/ www.secnews.physaphae.fr/article.php?IdArticle=1075639 False Data Breach None None Security Intelligence - Site de news Américain Hunting for the True Meaning of Threat Hunting at RSAC 2019 Many vendors at RSAC 2019 boasted of their advanced and even automated threat hunting capabilities, but it's important to understand the difference between true threat hunting and marketing jargon. ]]> 2019-03-21T12:30:03+00:00 https://securityintelligence.com/hunting-for-the-true-meaning-of-threat-hunting-at-rsac-2019/ www.secnews.physaphae.fr/article.php?IdArticle=1074697 False Threat None None Security Intelligence - Site de news Américain What Security Threats of the Past Can Tell Us About the Future of Cybersecurity If we look close enough, many new security threats are something we've seen in another form or an attack style we've had to previously defend against. ]]> 2019-03-21T12:00:02+00:00 https://securityintelligence.com/what-security-threats-of-the-past-can-tell-us-about-the-future-of-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=1074518 False None None None Security Intelligence - Site de news Américain Securing the Microservices Architecture: Decomposing the Monolith Without Compromising Information Security Ditching monolith for microservices may be right for your organization, but it's critical to address the relevant security considerations early in the process. ]]> 2019-03-21T11:30:02+00:00 https://securityintelligence.com/securing-the-microservices-architecture-decomposing-the-monolith-without-compromising-information-security/ www.secnews.physaphae.fr/article.php?IdArticle=1074519 False None None None Security Intelligence - Site de news Américain Creating Meaningful Diversity of Thought in the Cybersecurity Workforce Let's add the diversity of approach, diversity of values and advocacy for deep customer empathy to the cybersecurity workforce diversity we are building. ]]> 2019-03-20T13:00:02+00:00 https://securityintelligence.com/creating-meaningful-diversity-of-thought-in-the-cybersecurity-workforce/ www.secnews.physaphae.fr/article.php?IdArticle=1073496 False None None None Security Intelligence - Site de news Américain The Business of Organized Cybercrime: Rising Intergang Collaboration in 2018 In 2018, IBM X-Force researchers observed organized cybercrime groups collaborating, rather than competing over turf or even attacking each other, for the first time. ]]> 2019-03-20T10:00:02+00:00 https://securityintelligence.com/the-business-of-organized-cybercrime-rising-intergang-collaboration-in-2018/ www.secnews.physaphae.fr/article.php?IdArticle=1073497 False None None None Security Intelligence - Site de news Américain Why You Should Integrate IoT Security Into Your Vulnerability Management Program Many IT professionals and executives alike are not addressing IoT security at the same level at which it's creating tangible business risks. ]]> 2019-03-19T12:00:02+00:00 https://securityintelligence.com/why-you-should-integrate-iot-security-into-your-vulnerability-management-program/ www.secnews.physaphae.fr/article.php?IdArticle=1073498 False Vulnerability None None Security Intelligence - Site de news Américain The Biggest Stories From RSAC 2019: What Scares the Cybersecurity Experts? When the perspectives of CISOs and experts at RSAC 2019 are viewed as a continuum, you can begin to see a story emerging about the state of cybersecurity in 2019. ]]> 2019-03-18T12:45:01+00:00 https://securityintelligence.com/the-biggest-stories-from-rsac-2019-what-scares-the-cybersecurity-experts/ www.secnews.physaphae.fr/article.php?IdArticle=1073499 False None None None Security Intelligence - Site de news Américain How Patch Posture Reporting Improves Security Landscapes If your vulnerability management tools do not report on your company's patch posture, you may be missing crucial holes in your software that are ripe for exploitation. ]]> 2019-03-15T20:45:02+00:00 https://securityintelligence.com/how-patch-posture-reporting-improves-security-landscapes/ www.secnews.physaphae.fr/article.php?IdArticle=1071889 False Vulnerability None None