www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-04T10:52:16+00:00 www.secnews.physaphae.fr Security Intelligence - Site de news Américain Will We See the Rise of Vaporworms and Other New Fileless Attacks in 2019? The evolution of the new and difficult-to-detect category of fileless malware may soon take an insidious turn with the development of what some researchers are calling vaporworms. ]]> 2019-03-15T13:55:01+00:00 https://securityintelligence.com/will-we-see-the-rise-of-vaporworms-and-other-new-fileless-attacks-in-2019/ www.secnews.physaphae.fr/article.php?IdArticle=1071297 False Malware None None Security Intelligence - Site de news Américain Application Security Has Nothing to Do With Luck If a safe, secure product and a satisfied customer base is the pot of gold at the end of your rainbow, it's time to build application security processes into your development cycle. ]]> 2019-03-14T18:15:02+00:00 https://securityintelligence.com/application-security-has-nothing-to-do-with-luck/ www.secnews.physaphae.fr/article.php?IdArticle=1069894 False None None None Security Intelligence - Site de news Américain Breaking Down the Incident Notification Requirements in the EU\'s NIS Directive 2019-03-14T16:25:01+00:00 https://securityintelligence.com/breaking-down-the-incident-notification-requirements-in-the-eus-nis-directive/ www.secnews.physaphae.fr/article.php?IdArticle=1069718 False None None None Security Intelligence - Site de news Américain With AI for Cybersecurity, We Are Raising the Bar for Smart It's hard to believe a computer that couldn't read a newspaper was once considered smart. But as recent innovations in AI for cybersecurity have shown, we are constantly raising the bar for smart. ]]> 2019-03-13T16:10:02+00:00 https://securityintelligence.com/with-ai-for-cybersecurity-we-are-raising-the-bar-for-smart/ www.secnews.physaphae.fr/article.php?IdArticle=1067977 False None None None Security Intelligence - Site de news Américain How CISOs Can Facilitate the Advent of the Cognitive Enterprise Just as organizations get comfortable with leveraging the cloud, another wave of digital disruption is on the horizon: artificial intelligence and its ability to drive the cognitive enterprise. ]]> 2019-03-13T12:20:02+00:00 https://securityintelligence.com/how-cisos-can-facilitate-the-advent-of-the-cognitive-enterprise/ www.secnews.physaphae.fr/article.php?IdArticle=1067557 False None None None Security Intelligence - Site de news Américain Spectre, Meltdown and More: What You Need to Know About Hardware Vulnerabilities According to IBM X-Force IRIS research, threat actors will continue to search for ways to leverage Spectre, Meltdown and other hardware vulnerabilities to steal data in the coming years. ]]> 2019-03-12T13:30:02+00:00 https://securityintelligence.com/spectre-meltdown-and-more-what-you-need-to-know-about-hardware-vulnerabilities/ www.secnews.physaphae.fr/article.php?IdArticle=1065878 False Threat None None Security Intelligence - Site de news Américain An Apple a Day Won\'t Improve Your Security Hygiene, But a Cyber Doctor Might 2019-03-12T12:00:02+00:00 https://securityintelligence.com/an-apple-a-day-wont-improve-your-security-hygiene-but-a-cyber-doctor-might/ www.secnews.physaphae.fr/article.php?IdArticle=1065732 False None None None Security Intelligence - Site de news Américain Security Considerations for Whatever Cloud Service Model You Adopt Regardless of what cloud service model you adopt, it's important to consider security implications related to application development, data and contract management, and IT asset governance. ]]> 2019-03-11T12:00:02+00:00 https://securityintelligence.com/security-considerations-for-whatever-cloud-service-model-you-adopt/ www.secnews.physaphae.fr/article.php?IdArticle=1064123 False None None None Security Intelligence - Site de news Américain Women in Security Speak Out at RSAC 2019, But There\'s Still a Long Way to Go 2019-03-08T20:40:02+00:00 https://securityintelligence.com/women-in-security-speak-out-at-rsac-2019-but-theres-still-a-long-way-to-go/ www.secnews.physaphae.fr/article.php?IdArticle=1061036 False None None None Security Intelligence - Site de news Américain At RSAC 2019, It\'s Clear the World Needs More Public Interest Technologists 2019-03-08T17:55:02+00:00 https://securityintelligence.com/at-rsac-2019-its-clear-the-world-needs-more-public-interest-technologists/ www.secnews.physaphae.fr/article.php?IdArticle=1060751 False None None None Security Intelligence - Site de news Américain Celebrating International Women\'s Day: Why We Need Better Representation of Women in Security 2019-03-08T13:30:05+00:00 https://securityintelligence.com/celebrating-international-womens-day-why-we-need-better-representation-of-women-in-security/ www.secnews.physaphae.fr/article.php?IdArticle=1060334 False None None None Security Intelligence - Site de news Américain Comprehensive Vulnerability Management in Connected Security Solutions To stay ahead of attackers, organizations should consider vulnerability management solutions that integrate with SIEM tools, network and threat modeling capabilities, and patch management systems. ]]> 2019-03-07T13:05:02+00:00 https://securityintelligence.com/comprehensive-vulnerability-management-in-connected-security-solutions/ www.secnews.physaphae.fr/article.php?IdArticle=1058079 False Vulnerability,Threat None None Security Intelligence - Site de news Américain It\'s Time for an Automotive Cybersecurity Wake-Up Call 2019-03-07T13:00:02+00:00 https://securityintelligence.com/its-time-for-an-automotive-cybersecurity-wake-up-call/ www.secnews.physaphae.fr/article.php?IdArticle=1058001 False None None None Security Intelligence - Site de news Américain Don\'t Believe Your Eyes: Deepfake Videos Are Coming to Fool Us All 2019-03-06T13:00:02+00:00 https://securityintelligence.com/dont-believe-your-eyes-deepfake-videos-are-coming-to-fool-us-all/ www.secnews.physaphae.fr/article.php?IdArticle=1056065 False None None None Security Intelligence - Site de news Américain Spring Cleaning for CISOs: Replace These 3 Bad Habits With Better Cybersecurity Practices Spring is just around the corner, which means it's time for CISOs to evaluate their security strategy, eliminate processes that aren't working, and adopt new cybersecurity practices and technologies. ]]> 2019-03-05T14:15:02+00:00 https://securityintelligence.com/spring-cleaning-for-cisos-replace-these-3-bad-habits-with-better-cybersecurity-practices/ www.secnews.physaphae.fr/article.php?IdArticle=1054375 False None None None Security Intelligence - Site de news Américain How to Accelerate Your Cloud IAM Adoption Moving identity management processes to cloud IAM services introduces benefits such as cost-efficiency, flexibility, faster deployments and simplified operations. ]]> 2019-03-05T14:00:02+00:00 https://securityintelligence.com/how-to-accelerate-your-cloud-iam-adoption/ www.secnews.physaphae.fr/article.php?IdArticle=1054297 False None None None Security Intelligence - Site de news Américain Blockchain: Making the Reward Much Greater Than the Risk The decentralized nature of blockchain, coupled with consensus protocols, helps to address some security needs, but the consequences can be dire if security isn't fully explored. ]]> 2019-03-05T11:00:02+00:00 https://securityintelligence.com/blockchain-making-the-reward-much-greater-than-the-risk/ www.secnews.physaphae.fr/article.php?IdArticle=1054043 False None None None Security Intelligence - Site de news Américain Are Your Employees Really Engaging With Security Awareness Training? Without security awareness training, security will not be front of mind for your end users - but that doesn't mean that companies with formal programs are effectively engaging their employees. ]]> 2019-03-04T13:30:02+00:00 https://securityintelligence.com/are-your-employees-really-engaging-with-security-awareness-training/ www.secnews.physaphae.fr/article.php?IdArticle=1052806 False None None None Security Intelligence - Site de news Américain Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems Two X-Force Red interns discovered 19 previously undisclosed vulnerabilities across five popular visitor management systems that could enable attackers to establish a foothold on corporate networks. ]]> 2019-03-04T11:00:02+00:00 https://securityintelligence.com/stranger-danger-x-force-red-finds-19-vulnerabilities-in-visitor-management-systems/ www.secnews.physaphae.fr/article.php?IdArticle=1052448 False None None None Security Intelligence - Site de news Américain Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics By following the example of industry leaders with mature security analytics capabilities, less advanced organizations can improve SOC visibility and shift from reactive to proactive threat detection. ]]> 2019-03-01T13:00:02+00:00 https://securityintelligence.com/follow-the-leaders-7-tried-and-true-tips-to-get-the-most-out-of-your-security-analytics/ www.secnews.physaphae.fr/article.php?IdArticle=1047665 False Threat,Guideline None None Security Intelligence - Site de news Américain How Can CISOs Improve Board Governance Around Cyber Risk Management? While some organizations have improved their board governance processes on cybersecurity issues, much of the work to drive progress falls on the shoulders of the CISO. ]]> 2019-02-28T16:15:03+00:00 https://securityintelligence.com/how-can-cisos-improve-board-governance-around-cyber-risk-management/ www.secnews.physaphae.fr/article.php?IdArticle=1046479 False None None None Security Intelligence - Site de news Américain Recapping IBM Think 2019 and HIMSS19: The Shared Landscape of Global Security We're only a few months into the year, but HIMSS19 and Think 2019 have already helped shape this year's focus on enterprise transformation, innovation and global cybersecurity. ]]> 2019-02-27T20:30:02+00:00 https://securityintelligence.com/recapping-ibm-think-2019-and-himss19-the-shared-landscape-of-global-security/ www.secnews.physaphae.fr/article.php?IdArticle=1045392 False None None None Security Intelligence - Site de news Américain When Combating Emerging Social Media Attacks, Don\'t Try to Swim Against the Current 2019-02-26T20:48:05+00:00 https://securityintelligence.com/when-combating-emerging-social-media-attacks-dont-try-to-swim-against-the-current/ www.secnews.physaphae.fr/article.php?IdArticle=1043582 False None None None Security Intelligence - Site de news Américain RSA Conference 2019 Guide: Insider Tips From an RSAC 2018 Survivor Discover tips on how to survive RSA Conference 2019, based on first-hand knowledge from an RSAC 2018 survivor and can't-miss sessions from this year's show. ]]> 2019-02-26T20:46:02+00:00 https://securityintelligence.com/rsa-conference-2019-guide-insider-tips-from-an-rsac-2018-survivor/ www.secnews.physaphae.fr/article.php?IdArticle=1043479 False None None None Security Intelligence - Site de news Américain Cryptojacking Rises 450 Percent as Cybercriminals Pivot From Ransomware to Stealthier Attacks Cybercriminals made a lot of noise in 2017 with ransomware attacks like WannaCry and NotPetya, using an in-your-face approach to cyberattacks that netted them millions of dollars from victims. But new research from IBM X-Force, the threat intelligence, research and incident response arm of IBM Security, revealed that 2018 saw a rapid decline in ransomware […] ]]> 2019-02-26T11:00:03+00:00 https://securityintelligence.com/cryptojacking-rises-450-percent-as-cybercriminals-pivot-from-ransomware-to-stealthier-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=1042492 False Ransomware,Threat NotPetya,Wannacry 2.0000000000000000 Security Intelligence - Site de news Américain Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security While current email security solutions can help mitigate phishing impacts, companies must recognize the role of corporate email as a social network to address the human components of this risk. ]]> 2019-02-21T13:45:02+00:00 https://securityintelligence.com/workplace-expectations-and-personal-exceptions-the-social-flaws-of-email-security/ www.secnews.physaphae.fr/article.php?IdArticle=1035238 False None None None Security Intelligence - Site de news Américain Calling Into Question the CVSS X-Force Red believes vulnerabilities should be ranked based on the importance of the exposed asset and whether the vulnerability is being weaponized by criminals, not necessarily its CVSS score. ]]> 2019-02-20T11:00:02+00:00 https://securityintelligence.com/calling-into-question-the-cvss/ www.secnews.physaphae.fr/article.php?IdArticle=1033607 False Vulnerability None None Security Intelligence - Site de news Américain Lessons from the Encryption Front Line: Core Components in the Cloud Depending on your needs, you can develop encryption solutions based on open standards from components you build and run yourself or source them as managed services from cloud providers. ]]> 2019-02-19T12:45:03+00:00 https://securityintelligence.com/lessons-from-the-encryption-front-line-core-components-in-the-cloud/ www.secnews.physaphae.fr/article.php?IdArticle=1032479 False None None None Security Intelligence - Site de news Américain Global Cyber Intelligence Maven Limor Kessem Is a Guiding Light for Women in Security Limor Kessem studied microbiology in school and planned to open a naturopathy clinic. She's now one of IBM Security's top cyber intelligence experts and a dedicated role model for women in security. ]]> 2019-02-18T13:00:03+00:00 https://securityintelligence.com/global-cyber-intelligence-maven-limor-kessem-is-a-guiding-light-for-women-in-security/ www.secnews.physaphae.fr/article.php?IdArticle=1031030 False None None None Security Intelligence - Site de news Américain Are Passwords Killing Your Customer Experience? Try Passwordless Authentication By implementing passwordless authentication, organizations can deliver the experience customers deserve and the security they demand. ]]> 2019-02-18T11:00:04+00:00 https://securityintelligence.com/are-passwords-killing-your-customer-experience-try-passwordless-authentication/ www.secnews.physaphae.fr/article.php?IdArticle=1030774 False None None None Security Intelligence - Site de news Américain Are You Really Covered by Your Cyber Insurance? Statistically, you're probably not. Even those with cyber insurance often have policies that leave them exposed to certain types of breaches, regulatory fines and real-world financial losses. ]]> 2019-02-15T14:40:03+00:00 https://securityintelligence.com/are-you-really-covered-by-your-cyber-insurance/ www.secnews.physaphae.fr/article.php?IdArticle=1028194 False None None None Security Intelligence - Site de news Américain Why You Need a Security-First Culture to Deliver on Your Customer-First Goals Organizations that do not establish a security-first culture will struggle to deliver on their customer-first initiatives. ]]> 2019-02-14T15:25:02+00:00 https://securityintelligence.com/why-you-need-a-security-first-culture-to-deliver-on-your-customer-first-goals/ www.secnews.physaphae.fr/article.php?IdArticle=1026825 False None None None Security Intelligence - Site de news Américain Take Your Relationship With DevSecOps to the Next Level Like any relationship, DevSecOps works best when there is a solid commitment, open communication and strong resolve in the face of challenges. ]]> 2019-02-14T13:40:03+00:00 https://securityintelligence.com/take-your-relationship-with-devsecops-to-the-next-level/ www.secnews.physaphae.fr/article.php?IdArticle=1026630 False None None None Security Intelligence - Site de news Américain Organizations Continue to Fail at IoT Security, and the Consequences Are Growing As the internet of things (IoT) takes over the world, IoT security remains, well, pitiful. Organizations are failing to ensure that the networks and data generated by IoT devices remain protected. ]]> 2019-02-14T12:35:03+00:00 https://securityintelligence.com/organizations-continue-to-fail-at-iot-security-and-the-consequences-are-growing/ www.secnews.physaphae.fr/article.php?IdArticle=1026526 False None None None Security Intelligence - Site de news Américain Cybersecurity Leaders From Maersk and Westfield Insurance Discuss Digital Transformation at Major Industry Event IBM Security General Manager Mary O'Brien sat down for a fireside chat with Kevin Baker, CISO of Westfield Insurance, and Maersk CISO Andy Powell about how digital transformation impacts security. ]]> 2019-02-13T20:30:04+00:00 https://securityintelligence.com/cybersecurity-leaders-from-maersk-and-westfield-insurance-discuss-digital-transformation-at-major-industry-event/ www.secnews.physaphae.fr/article.php?IdArticle=1025909 False None None None Security Intelligence - Site de news Américain What Have We Learned About Data Protection After Another Year of Breaches? In 2018, data protection became top of mind for organizations around the world. What lessons can we draw from to help improve regulatory compliance, data breach protection and risk management in 2019? ]]> 2019-02-13T13:30:04+00:00 https://securityintelligence.com/what-have-we-learned-about-data-protection-after-another-year-of-breaches/ www.secnews.physaphae.fr/article.php?IdArticle=1025475 False Data Breach None None Security Intelligence - Site de news Américain Developing a Security Plan Around Consumer Data Privacy Concerns The onus to meet the challenge of consumers' security and privacy expectations is on the enterprise. Developing a security plan around consumer concerns is a good first step. ]]> 2019-02-12T13:35:03+00:00 https://securityintelligence.com/developing-a-security-plan-around-consumer-data-privacy-concerns/ www.secnews.physaphae.fr/article.php?IdArticle=1024004 False None None None Security Intelligence - Site de news Américain Are Applications of AI in Cybersecurity Delivering What They Promised? Many enterprises are utilizing artificial intelligence (AI) technologies as part of their overall security strategy, but results are mixed on the usefulness of AI in cybersecurity settings. ]]> 2019-02-12T13:30:04+00:00 https://securityintelligence.com/are-applications-of-ai-in-cybersecurity-delivering-what-they-promised/ www.secnews.physaphae.fr/article.php?IdArticle=1024005 False None None None Security Intelligence - Site de news Américain How Nat Prakongpan Found His Home on the Cyber Range Nat Prakongpan was building enterprise networks for his school in Thailand in the seventh grade. Following a series of happy accidents, he found himself building an immersive cyber range for IBM. ]]> 2019-02-11T12:10:03+00:00 https://securityintelligence.com/how-nat-prakongpan-found-his-home-on-the-cyber-range/ www.secnews.physaphae.fr/article.php?IdArticle=1022209 False None None None Security Intelligence - Site de news Américain Employees Are Working From Home - Do You Know Where Your Remote Work Policy Is? A good remote work policy covers a broad range of categories, from employment rules to expense reporting to legal obligations. But the data security provisions are probably the most important. ]]> 2019-02-08T13:00:03+00:00 https://securityintelligence.com/employees-are-working-from-home-do-you-know-where-your-remote-work-policy-is/ www.secnews.physaphae.fr/article.php?IdArticle=1020203 False None None None Security Intelligence - Site de news Américain Now That You Have a Machine Learning Model, It\'s Time to Evaluate Your Security Classifier 2019-02-08T11:40:03+00:00 https://securityintelligence.com/now-that-you-have-a-machine-learning-model-its-time-to-evaluate-your-security-classifier/ www.secnews.physaphae.fr/article.php?IdArticle=1020204 False None None None Security Intelligence - Site de news Américain 6 Steps Every New CISO Should Take to Set Their Organization Up for Success Starting a new job in the CISO role can feel overwhelming. But the time for security to be seen as a key player - and to have a major business impact - has never been better. ]]> 2019-02-07T12:30:03+00:00 https://securityintelligence.com/6-steps-every-new-ciso-should-take-to-set-their-organization-up-for-success/ www.secnews.physaphae.fr/article.php?IdArticle=1020205 False None None None Security Intelligence - Site de news Américain Design Your IAM Program With Your Users in Mind To gain the buy-in you need to make your IAM program successful, it's important to consider your employees' goals and needs during the design process. ]]> 2019-02-06T15:30:04+00:00 https://securityintelligence.com/design-your-iam-program-with-your-users-in-mind/ www.secnews.physaphae.fr/article.php?IdArticle=1020206 False None None None Security Intelligence - Site de news Américain To Improve Critical Infrastructure Security, Bring IT and OT Together Strong collaboration between IT and OT is a critical step in improving the security of critical infrastructure systems. ]]> 2019-02-06T14:45:03+00:00 https://securityintelligence.com/to-improve-critical-infrastructure-security-bring-it-and-ot-together/ www.secnews.physaphae.fr/article.php?IdArticle=1020207 False None None None Security Intelligence - Site de news Américain IcedID Operators Using ATSEngine Injection Panel to Hit E-Commerce Sites The X-Force research team investigated the IcedID Trojan's two-step injection attack that enables it to steal access credentials and payment card data from e-commerce customers in North America. ]]> 2019-02-06T11:00:05+00:00 https://securityintelligence.com/icedid-operators-using-atsengine-injection-panel-to-hit-e-commerce-sites/ www.secnews.physaphae.fr/article.php?IdArticle=1020208 False None None None Security Intelligence - Site de news Américain How \'Mini CEO\' Laurene Hummer Engineers Better Identity and Access Management 2019-02-05T13:55:02+00:00 https://securityintelligence.com/how-mini-ceo-laurene-hummer-engineers-better-identity-and-access-management/ www.secnews.physaphae.fr/article.php?IdArticle=1020209 False None None None Security Intelligence - Site de news Américain It\'s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare 2019-02-05T13:20:04+00:00 https://securityintelligence.com/its-time-to-modernize-traditional-threat-intelligence-models-for-cyber-warfare/ www.secnews.physaphae.fr/article.php?IdArticle=1020210 False Threat,Guideline None None Security Intelligence - Site de news Américain Drive Innovation With Your Security Strategy in 2019 As we enter the second month of 2019, organizations should make sure their security strategy accounts for emerging trends, such as the erosion of customer trust and the cybersecurity skills gap. ]]> 2019-02-04T12:45:05+00:00 https://securityintelligence.com/drive-innovation-with-your-security-strategy-in-2019/ www.secnews.physaphae.fr/article.php?IdArticle=1020211 False None None None Security Intelligence - Site de news Américain Manage Emerging Cybersecurity Risks by Rallying Around Mutual Concerns Chief information security officers (CISOs) are looking for ways to set the tone for the year and have more engaged conversations with top leadership regarding cybersecurity risks. ]]> 2019-02-04T12:45:03+00:00 https://securityintelligence.com/manage-emerging-cybersecurity-risks-by-rallying-around-mutual-concerns/ www.secnews.physaphae.fr/article.php?IdArticle=1020212 False Guideline None None Security Intelligence - Site de news Américain Data Breach Fatigue Makes Every Day Feel Like Groundhog Day The incessant stream of high-profile data breaches can make every day seem like Groundhog Day. How can businesses combat data breach fatigue and rebuild trust through improved breach response? ]]> 2019-02-01T16:10:03+00:00 https://securityintelligence.com/data-breach-fatigue-makes-every-day-feel-like-groundhog-day/ www.secnews.physaphae.fr/article.php?IdArticle=1019513 False Data Breach None None Security Intelligence - Site de news Américain AI May Soon Defeat Biometric Security, Even Facial Recognition Software Threat actors will soon gain access to artificial intelligence (AI) tools that will enable them to defeat multiple kinds of authentication systems, even biometric security. ]]> 2019-01-31T16:00:04+00:00 https://securityintelligence.com/ai-may-soon-defeat-biometric-security-even-facial-recognition-software/ www.secnews.physaphae.fr/article.php?IdArticle=1017151 False None None None Security Intelligence - Site de news Américain Hey Siri, Get My Coffee, Hold the Malware According to IBM X-Force IRIS research, there are several security concerns that should be taken into consideration before using Siri Shortcuts. ]]> 2019-01-31T11:00:03+00:00 https://securityintelligence.com/hey-siri-get-my-coffee-hold-the-malware/ www.secnews.physaphae.fr/article.php?IdArticle=1016479 False Malware None None Security Intelligence - Site de news Américain How Fraud Specialist Danna Pelleg Fights Bad Guys With the Best Team in the Business Danna Pelleg's childhood curiosity, early technology education and compulsion to fight the bad guys led her to a career as a fraud specialist and security operations team lead at IBM Trusteer. ]]> 2019-01-30T14:35:02+00:00 https://securityintelligence.com/how-fraud-specialist-danna-pelleg-fights-bad-guys-with-the-best-team-in-the-business/ www.secnews.physaphae.fr/article.php?IdArticle=1015125 False Guideline None None Security Intelligence - Site de news Américain Intelligent Access Certification Improves Decision-Making Around Compliance, Identity Governance and More Intelligent access certification helps security teams improve visibility into access, prioritize compliance tasks with risk-based insights and make better decisions with actionable intelligence. ]]> 2019-01-30T10:05:03+00:00 https://securityintelligence.com/intelligent-access-certification-improves-decision-making-around-compliance-identity-governance-and-more/ www.secnews.physaphae.fr/article.php?IdArticle=1014824 False None None None Security Intelligence - Site de news Américain How to Build a System Hardening Program From the Ground Up System hardening is more than just creating configuration standards; it involves identifying and tracking assets, drafting a configuration management methodology, and maintaining system parameters. ]]> 2019-01-29T14:15:02+00:00 https://securityintelligence.com/how-to-build-a-system-hardening-program-from-the-ground-up/ www.secnews.physaphae.fr/article.php?IdArticle=1013705 False None None None Security Intelligence - Site de news Américain Social Engineering Training: Why Getting Hacked Is a Security Advantage Social engineering and security awareness training exercises can help business leaders uncover gaps in their incident response plans and identify poor security hygiene among employees. ]]> 2019-01-28T17:30:03+00:00 https://securityintelligence.com/social-engineering-training-why-getting-hacked-is-a-security-advantage/ www.secnews.physaphae.fr/article.php?IdArticle=1012388 False Guideline None None Security Intelligence - Site de news Américain Break Through Cybersecurity Complexity With New Rules, Not More Tools While many CISOs are tempted to invest in as many new technologies as they can find to fight emerging threats, less is more when it comes to minimizing cybersecurity complexity. ]]> 2019-01-28T16:15:02+00:00 https://securityintelligence.com/break-through-cybersecurity-complexity-with-new-rules-not-more-tools/ www.secnews.physaphae.fr/article.php?IdArticle=1012322 False None None None Security Intelligence - Site de news Américain Why You Should Be Worried About London Blue\'s Business Email Compromise Attacks 2019-01-28T12:30:03+00:00 https://securityintelligence.com/why-you-should-be-worried-about-london-blues-business-email-compromise-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=1011943 False Threat None None Security Intelligence - Site de news Américain Maximize Your Defenses by Fine-Tuning the Oscillation of Cybersecurity Incidents In the information security field, we're always practicing finding vulnerabilities, keeping threats at bay, responding to cybersecurity incidents and minimizing long-term business risks. ]]> 2019-01-25T13:30:03+00:00 https://securityintelligence.com/maximize-your-defenses-by-fine-tuning-the-oscillation-of-cybersecurity-incidents/ www.secnews.physaphae.fr/article.php?IdArticle=1008848 False None None None Security Intelligence - Site de news Américain As BYOD Adoption and Mobile Threats Increase, Can Enterprise Data Security Keep Up? While most security professionals have come to embrace bring-your-own-device (BYOD) policies, leadership still often lacks confidence in the data security of employees' personal devices. ]]> 2019-01-24T13:45:03+00:00 https://securityintelligence.com/as-byod-adoption-and-mobile-threats-increase-can-enterprise-data-security-keep-up/ www.secnews.physaphae.fr/article.php?IdArticle=1007254 False Guideline None None Security Intelligence - Site de news Américain The App Approval Workflow Keeps Enterprise Security in Check Without Disrupting Productivity The integrity of the applications deployed to your workforce is crucial to enterprise security. The app approval workflow helps you vet these programs and integrate them with existing tools. ]]> 2019-01-23T14:01:02+00:00 https://securityintelligence.com/the-app-approval-workflow-keeps-enterprise-security-in-check-without-disrupting-productivity/ www.secnews.physaphae.fr/article.php?IdArticle=1005515 False None None None Security Intelligence - Site de news Américain How Former Bomb Disposal Expert and Lighting Designer Shaked Vax Pivoted Toward a Cybersecurity Career Shaked Vax dismantles bombs and created light shows for rock stars before starting his cybersecurity career. Now he's leading IBM Trusteer's move into frictionless identity management. ]]> 2019-01-23T14:00:04+00:00 https://securityintelligence.com/how-former-bomb-disposal-expert-and-lighting-designer-shaked-vax-pivoted-toward-a-cybersecurity-career/ www.secnews.physaphae.fr/article.php?IdArticle=1005516 False Guideline None None Security Intelligence - Site de news Américain What Does Healthcare Cybersecurity Look Like in a Future of Connected Medical Devices? 2019-01-22T14:05:01+00:00 https://securityintelligence.com/what-does-healthcare-cybersecurity-look-like-in-a-future-of-connected-medical-devices/ www.secnews.physaphae.fr/article.php?IdArticle=1003712 False None None None Security Intelligence - Site de news Américain Embrace the Intelligence Cycle to Secure Your Business Whether you're protecting data, financial assets or even people, the intelligence cycle can help you gather data and contextualize it in terms of what you already know and what you hope to learn. ]]> 2019-01-22T13:40:02+00:00 https://securityintelligence.com/embrace-the-intelligence-cycle-to-secure-your-business/ www.secnews.physaphae.fr/article.php?IdArticle=1003713 False None None None Security Intelligence - Site de news Américain Multifactor Authentication Delivers the Convenience and Security Online Shoppers Demand When framed as an innovative, even "cool" feature, multifactor authentication can deliver the security online retail customers demand without diminishing the user experience. ]]> 2019-01-21T13:15:02+00:00 https://securityintelligence.com/multifactor-authentication-delivers-the-convenience-and-security-online-shoppers-demand/ www.secnews.physaphae.fr/article.php?IdArticle=1002279 False None None None Security Intelligence - Site de news Américain Why CISOs and Boards Should Work Together to Improve Cybersecurity Disclosure Just how well are organizations informing stakeholders about cyber risks? That was the question that EY sought to answer in their recent "Cybersecurity disclosure benchmarking" report. ]]> 2019-01-21T12:15:02+00:00 https://securityintelligence.com/why-cisos-and-boards-should-work-together-to-improve-cybersecurity-disclosure/ www.secnews.physaphae.fr/article.php?IdArticle=1002172 False None None None Security Intelligence - Site de news Américain What Can Consumers and IT Decision-Makers Do About the Threat of Malvertising? Malvertising is one more threat that will keep your IT decision-makers up at night, but any company with a protection-first mindset should be able to remain ahead of the curve. ]]> 2019-01-21T12:05:02+00:00 https://securityintelligence.com/what-can-consumers-and-it-decision-makers-do-about-the-threat-of-malvertising/ www.secnews.physaphae.fr/article.php?IdArticle=1002173 False Threat None None Security Intelligence - Site de news Américain Succeed in Your Cloud Migration With a Secure Hybrid Cloud Strategy In the rush to digital transformation, treating cloud security services as an afterthought to hybrid cloud adoption is an increasingly risky mistake. ]]> 2019-01-18T14:00:01+00:00 https://securityintelligence.com/succeed-in-your-digital-transformation-with-a-secure-hybrid-cloud-strategy/ www.secnews.physaphae.fr/article.php?IdArticle=998699 False None None None Security Intelligence - Site de news Américain 10 Cybersecurity Conference Trips You Should Make Time for This Year Not sure where to distribute IT budgets for ideal returns? Here's a roundup of the top 10 cybersecurity conference trips to make time for this year. ]]> 2019-01-18T12:35:02+00:00 https://securityintelligence.com/10-cybersecurity-conference-trips-you-should-make-time-for-this-year/ www.secnews.physaphae.fr/article.php?IdArticle=998497 False None None None Security Intelligence - Site de news Américain Board Directors Can\'t Afford to Ignore Cybersecurity Risk 2019-01-17T14:15:02+00:00 https://securityintelligence.com/board-directors-cant-afford-to-ignore-cybersecurity-risk/ www.secnews.physaphae.fr/article.php?IdArticle=997119 False None None None Security Intelligence - Site de news Américain Bring Order to Chaos By Building SIEM Use Cases, Standards, Baselining and Naming Conventions Standards, baselines and naming conventions can remove barriers to threat detection and response and help security teams build effective SIEM use cases. ]]> 2019-01-17T13:05:01+00:00 https://securityintelligence.com/bring-order-to-chaos-by-building-siem-use-cases-standards-baselining-and-naming-conventions/ www.secnews.physaphae.fr/article.php?IdArticle=997021 False Threat None None Security Intelligence - Site de news Américain Stay Ahead of the Growing Security Analytics Market With These Best Practices Armed with security analytics tools, organizations can benefit from big data capabilities to analyze data and enhance detection with proactive alerts about potential malicious activity. ]]> 2019-01-16T13:55:01+00:00 https://securityintelligence.com/stay-ahead-of-the-growing-security-analytics-market-with-these-best-practices/ www.secnews.physaphae.fr/article.php?IdArticle=995079 False None None None Security Intelligence - Site de news Américain The Success of Your Business Depends on Digital Trust. Here Is How to Measure It As consumers become more aware of their data privacy, organizations across sectors are under increasing pressure to deliver frinctionless digital trust. ]]> 2019-01-16T08:55:04+00:00 https://securityintelligence.com/the-success-of-your-business-depends-on-digital-trust-here-is-how-to-measure-it/ www.secnews.physaphae.fr/article.php?IdArticle=994744 False None None None Security Intelligence - Site de news Américain Where Can IT Get Expert Guidance for Managing Android in the Enterprise? IT decision-makers need to fast-track the EMM selection process to stay ahead of the evolving threat landscape and more effectively manage Android devices. ]]> 2019-01-15T17:00:02+00:00 https://securityintelligence.com/where-can-it-get-expert-guidance-for-managing-android-in-the-enterprise/ www.secnews.physaphae.fr/article.php?IdArticle=993821 False Threat None None Security Intelligence - Site de news Américain The Success of Your Business Depends on Your Security Culture Given the historic data breaches, widespread vulnerabilities and onslaught of data privacy regulations that affected businesses around the world in 2018, security culture is more crucial than ever. ]]> 2019-01-15T12:55:01+00:00 https://securityintelligence.com/the-success-of-your-business-depends-on-your-security-culture/ www.secnews.physaphae.fr/article.php?IdArticle=993377 False None None None Security Intelligence - Site de news Américain How Secure Are Medical IoT Devices? Catherine Norcom Has Her Finger on the Pulse of the Industry We chatted with X-Force Red's resident hardware hacker, Catherine Norcom, about the FDA's recent guidance on securing medical IoT devices. ]]> 2019-01-15T11:00:02+00:00 https://securityintelligence.com/how-secure-are-medical-iot-devices-catherine-norcom-has-her-finger-on-the-pulse-of-the-industry/ www.secnews.physaphae.fr/article.php?IdArticle=993249 False None None None Security Intelligence - Site de news Américain Need a Sounding Board for Your Incident Response Plan? Join a Security Community Joining a security community is a great way to get advice and feedback on your incident response plan from like-minded peers. ]]> 2019-01-14T15:25:01+00:00 https://securityintelligence.com/need-a-sounding-board-for-your-incident-response-plan-join-a-security-community/ www.secnews.physaphae.fr/article.php?IdArticle=991846 False None None None Security Intelligence - Site de news Américain Protect Your Critical Assets in a Landscape of Expanding Attack Surfaces Security leaders face more challenges to protect critical assets than ever. The evolving enterprise landscape has created a need for new frameworks and solutions to achieve visibility and control. ]]> 2019-01-14T13:00:04+00:00 https://securityintelligence.com/three-steps-you-can-take-to-protect-your-critical-assets/ www.secnews.physaphae.fr/article.php?IdArticle=991516 False Guideline None None Security Intelligence - Site de news Américain When It Comes to Cyber Risks, A Confident Board Isn\'t Always a Good Thing 2019-01-14T12:50:02+00:00 https://securityintelligence.com/when-it-comes-to-cyber-risks-a-confident-board-isnt-always-a-good-thing/ www.secnews.physaphae.fr/article.php?IdArticle=991517 False None None None Security Intelligence - Site de news Américain Maturing Your Security Operations Center With the Art and Science of Threat Hunting By combining repeatable processes for threat hunting with intelligent solutions and skilled analysts, organizations can improve threat response and protect their most critical assets. ]]> 2019-01-11T12:35:02+00:00 https://securityintelligence.com/maturing-your-security-operations-center-with-the-art-and-science-of-threat-hunting/ www.secnews.physaphae.fr/article.php?IdArticle=986591 False Threat None None Security Intelligence - Site de news Américain FBI Warns EdTech Needs Stronger Defenses for Students\' Personal Data 2019-01-11T12:20:02+00:00 https://securityintelligence.com/fbi-warns-edtech-needs-stronger-defenses-for-students-personal-data/ www.secnews.physaphae.fr/article.php?IdArticle=986592 False Threat None None Security Intelligence - Site de news Américain How the Financial Services Industry Is Preparing to Avoid and Respond to Systemic Cyberattacks Financial services industry leaders visited the IBM X-Force Command Cyber Range for a war game exercise designed to battle-test their response to a systemic cyberattack. ]]> 2019-01-10T14:30:02+00:00 https://securityintelligence.com/how-the-financial-services-industry-is-preparing-to-avoid-and-respond-to-systemic-cyberattacks/ www.secnews.physaphae.fr/article.php?IdArticle=984934 False Guideline None None Security Intelligence - Site de news Américain Deciphering the Encryption Paradox The practice of protecting network data with encryption is gaining steam, and with good reason. But companies need adequate network visibility to keep up with threats that evade traditional detection. ]]> 2019-01-09T14:25:01+00:00 https://securityintelligence.com/deciphering-the-encryption-paradox/ www.secnews.physaphae.fr/article.php?IdArticle=982752 False None None None Security Intelligence - Site de news Américain Maximize Your Security Operations Center Efficiency With Incident Response Orchestration Incident response orchestration and automation can help boost the accuracy and efficiency of IR processes and reduce the burden on the understaffed SOC. ]]> 2019-01-09T12:45:03+00:00 https://securityintelligence.com/maximize-your-security-operations-center-efficiency-with-incident-response-orchestration/ www.secnews.physaphae.fr/article.php?IdArticle=982550 False None None None Security Intelligence - Site de news Américain 3 Urgent Areas of Action to Address National Cybersecurity Risks The U.S. is not where it needs to be in terms of managing cybersecurity risks as a national effort, according to the Aspen Cybersecurity Group. ]]> 2019-01-09T12:40:02+00:00 https://securityintelligence.com/3-urgent-areas-of-action-to-address-national-cybersecurity-risks/ www.secnews.physaphae.fr/article.php?IdArticle=982551 False None None None Security Intelligence - Site de news Américain SIEM Event Normalization Makes Raw Data Relevant to Both Humans and Machines In its raw form, log data is almost impossible for a human to process, so advanced SIEM solutions conduct a process called event normalization to deliver a homogeneous view. ]]> 2019-01-08T15:05:01+00:00 https://securityintelligence.com/siem-event-normalization-makes-raw-data-relevant-to-both-humans-and-machines/ www.secnews.physaphae.fr/article.php?IdArticle=981159 False None None None Security Intelligence - Site de news Américain The System Development Life Cycle: A Phased Approach to Application Security By completing the phases of the system development life cycle (SDLC), security teams can integrate processes and technologies into the development process and improve application security. ]]> 2019-01-07T17:20:02+00:00 https://securityintelligence.com/the-system-development-life-cycle-a-phased-approach-to-application-security/ www.secnews.physaphae.fr/article.php?IdArticle=979373 False None None None Security Intelligence - Site de news Américain Is It Time for Enterprises to Bid Farewell to BYOD? As BYOD practices blur the boundary of the enterprise perimeter, how can security leaders ensure corporate data is safe? ]]> 2019-01-07T12:55:02+00:00 https://securityintelligence.com/is-it-time-for-enterprises-to-bid-farewell-to-byod/ www.secnews.physaphae.fr/article.php?IdArticle=978882 False Guideline None None Security Intelligence - Site de news Américain Close the Gap on Advanced Threats With Integrated Security Advanced threats are evolving faster than enterprise security, despite record spend. Organizations need an integrated ecosystem of solutions that provide visibility into anomalies and potential risks. ]]> 2019-01-07T11:50:00+00:00 https://securityintelligence.com/close-the-gap-on-advanced-threats-with-integrated-security/ www.secnews.physaphae.fr/article.php?IdArticle=978883 False None None None Security Intelligence - Site de news Américain New Year, New Risks: 3 Application Security Resolutions You Should Adopt in 2019 To ring in the new year, application security teams should resolve to implement more security into the development process, prioritize consumer trust and pay more attention to false negatives. ]]> 2019-01-04T13:05:02+00:00 https://securityintelligence.com/new-year-new-risks-3-application-security-resolutions-you-should-adopt-in-2019/ www.secnews.physaphae.fr/article.php?IdArticle=975976 False None None None Security Intelligence - Site de news Américain Your Security Strategy Is Only as Strong as Your Cyber Hygiene Without full network visibility and regular utilization of cyber hygiene best practices, your enterprise could face very real, but entirely preventable, security risks. ]]> 2019-01-04T12:30:03+00:00 https://securityintelligence.com/your-security-strategy-is-only-as-strong-as-your-cyber-hygiene/ www.secnews.physaphae.fr/article.php?IdArticle=975908 False None None None Security Intelligence - Site de news Américain The Gift That Keeps on Giving: PCI Compliance for Post-Holiday Season Returns Holiday spending is on the rise both in-store and online. How can retailers ensure PCI compliance to manage large transaction volumes and post-holiday refunds? ]]> 2019-01-03T13:25:02+00:00 https://securityintelligence.com/the-gift-that-keeps-on-giving-pci-compliance-for-post-holiday-season-returns/ www.secnews.physaphae.fr/article.php?IdArticle=974677 False None None None Security Intelligence - Site de news Américain Government Cybersecurity Processes Must Change Drastically to Keep Up With Complex Attack Vectors Since governments have so many potential attack vectors to manage, government cybersecurity professionals need clear processes, procedures and authority to harden vulnerable environments. ]]> 2019-01-03T13:00:02+00:00 https://securityintelligence.com/government-cybersecurity-processes-must-change-drastically-to-keep-up-with-complex-attack-vectors/ www.secnews.physaphae.fr/article.php?IdArticle=974598 False None None None Security Intelligence - Site de news Américain Who Goes There? The Art of Digital Identity and Access Management To connect the real world to the digital world, we can create digital identity models that represent a person with different attributes, characteristics and goals. ]]> 2019-01-03T12:40:02+00:00 https://securityintelligence.com/who-goes-there-the-art-of-digital-identity-and-access-management/ www.secnews.physaphae.fr/article.php?IdArticle=974599 False None None None Security Intelligence - Site de news Américain Why Proactive Data Compliance Is Imperative for Secure Digital Transformation The risks associated with failure to establish proactive data compliance go far beyond regulatory violations and loss of consumer trust. Compliance is critical for secure digital transformation. ]]> 2019-01-02T14:30:02+00:00 https://securityintelligence.com/why-proactive-data-compliance-is-imperative-for-secure-digital-transformation/ www.secnews.physaphae.fr/article.php?IdArticle=975912 False None None None Security Intelligence - Site de news Américain Top 2019 Cybersecurity Predictions From the Resilient Year-End Webinar During the recent IBM Resilient year-end webinar, expert panelists discussed and debated the trends that defined 2018 and offered cybersecurity predictions on what the industry can expect in 2019. ]]> 2019-01-02T13:05:01+00:00 https://securityintelligence.com/top-2019-cybersecurity-predictions-from-the-resilient-year-end-webinar/ www.secnews.physaphae.fr/article.php?IdArticle=973612 False None None None Security Intelligence - Site de news Américain It\'s Time to Dispel These Dangerous Password Security Myths 2019-01-02T12:45:02+00:00 https://securityintelligence.com/its-time-to-dispel-these-dangerous-password-security-myths/ www.secnews.physaphae.fr/article.php?IdArticle=973530 False None None None Security Intelligence - Site de news Américain Lessons From the Data Encryption Front Line: Understanding Common Threats There is no single answer to the question of how to best use data encryption. Depending on their application and data types, organizations will likely need to apply different architectural patterns. ]]> 2019-01-02T12:15:02+00:00 https://securityintelligence.com/lessons-from-the-data-encryption-front-line-understanding-common-threats/ www.secnews.physaphae.fr/article.php?IdArticle=973531 False None None None Security Intelligence - Site de news Américain The Cyber Attribution Dilemma: 3 Barriers to Cyber Deterrence The concept of mutually assured destruction (MAD) has historically prevented nuclear war, but threat actors' advanced obfuscation techniques have made cyber deterrence difficult if not impossible. ]]> 2018-12-28T16:30:02+00:00 https://securityintelligence.com/the-cyber-attribution-dilemma-3-barriers-to-cyber-deterrence/ www.secnews.physaphae.fr/article.php?IdArticle=968613 False Threat None None Security Intelligence - Site de news Américain There Is No Perfect Time to Tackle Security Tasks, So Don\'t Wait Until It\'s Too Late 2018-12-28T12:40:02+00:00 https://securityintelligence.com/there-is-no-perfect-time-to-tackle-security-tasks-so-dont-wait-until-its-too-late/ www.secnews.physaphae.fr/article.php?IdArticle=968283 False None None None