www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-04T13:02:58+00:00 www.secnews.physaphae.fr Security Intelligence - Site de news Américain Is 5G Technology a Blessing or a Curse for Security? Depends Who You Ask With blazing fast speeds and lower latency, will 5G technology mitigate or exacerbate existing network security concerns? ]]> 2018-12-27T12:35:02+00:00 https://securityintelligence.com/is-5g-technology-a-blessing-or-a-curse-for-security-depends-who-you-ask/ www.secnews.physaphae.fr/article.php?IdArticle=966891 False None None None Security Intelligence - Site de news Américain 4 Ways to Overcome the Cyber Workforce Shortage The supply/demand ratio for the cyber workforce is now about 2.3 skilled workers per job opening, according to NIST. Security leaders need to be more creative to fill the gaps in their teams. ]]> 2018-12-26T12:50:02+00:00 https://securityintelligence.com/4-ways-to-overcome-the-cyber-workforce-shortage/ www.secnews.physaphae.fr/article.php?IdArticle=965467 False Guideline None None Security Intelligence - Site de news Américain More Than Just a Fad: Lessons Learned About Threat Hunting in 2018 One cybersecurity capability that continues to prove it's here to stay is threat hunting, a proactive approach to discovering and mitigating threats. ]]> 2018-12-21T14:20:02+00:00 https://securityintelligence.com/more-than-just-a-fad-lessons-learned-about-threat-hunting-in-2018/ www.secnews.physaphae.fr/article.php?IdArticle=958560 False Threat None None Security Intelligence - Site de news Américain How Allison Ritter Puts Security Lessons Into Action With Her Flare for Drama A love of the visual arts and a passion for drama brought Allison Ritter to the IBM X-Force Command Center. She channels these passions to create engaging, interactive security lessons for clients. ]]> 2018-12-21T12:10:02+00:00 https://securityintelligence.com/how-allison-ritter-puts-security-lessons-into-action-with-her-flare-for-drama/ www.secnews.physaphae.fr/article.php?IdArticle=958417 False None None None Security Intelligence - Site de news Américain IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape IBM X-Force's top security predictions for 2019 cover a range of potential attack schemes and consequences, from industry-specific prognostications to a rapid expansion of emerging criminal schemes. ]]> 2018-12-20T13:00:02+00:00 https://securityintelligence.com/ibm-x-force-security-predictions-for-the-2019-cybercrime-threat-landscape/ www.secnews.physaphae.fr/article.php?IdArticle=956499 False Threat None None Security Intelligence - Site de news Américain Cloud Security With a Chance of Data Breaches Companies should look for a cloud security solution that sits in front of the database and can send traffic to your existing tools without having to install any software on the database. ]]> 2018-12-19T13:00:02+00:00 https://securityintelligence.com/cloud-security-with-a-chance-of-data-breaches/ www.secnews.physaphae.fr/article.php?IdArticle=954220 False None None None Security Intelligence - Site de news Américain Machine Learning Will Transform How We Detect Software Vulnerabilities When used as part of the software development process, machine learning can help identify vulnerabilities before threat actors have a chance to exploit them. ]]> 2018-12-18T13:00:02+00:00 https://securityintelligence.com/machine-learning-will-transform-how-we-detect-software-vulnerabilities/ www.secnews.physaphae.fr/article.php?IdArticle=952373 False Threat None None Security Intelligence - Site de news Américain From Naughty to NICE: Best Practices for K–12 Cybersecurity Education The National Institute for Cybersecurity Education is leading the charge in K–12 security awareness training. ]]> 2018-12-18T11:55:01+00:00 https://securityintelligence.com/from-naughty-to-nice-best-practices-for-k-12-cybersecurity-education/ www.secnews.physaphae.fr/article.php?IdArticle=952246 False Guideline None None Security Intelligence - Site de news Américain Is It Time to Start a PSIRT? Why Your CSIRT May Not Be Enough Your CSIRT protects your organizational network, but who secures your products? It may be time you started a PSIRT at your company. ]]> 2018-12-17T16:45:02+00:00 https://securityintelligence.com/is-it-time-to-start-a-psirt-why-your-csirt-may-not-be-enough/ www.secnews.physaphae.fr/article.php?IdArticle=950893 False None None None Security Intelligence - Site de news Américain How I Hacked My Connected Car, and Other Thoughts on Vehicle Cybersecurity Even if you're not into car hacks, you should still learn about the future of vehicle cybersecurity and the challenge it represents. But if you are, read on to learn how I hacked my connected car. ]]> 2018-12-17T12:15:02+00:00 https://securityintelligence.com/how-i-hacked-my-connected-vehicle-and-other-thoughts-on-vehicle-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=950506 False None None None Security Intelligence - Site de news Américain How to Check for Blind Spots in Your Security Program An effective security program does more than merely take on the appearance of cyber resilience. Learn how to look behind the curtain of your enterprise security. ]]> 2018-12-17T11:40:01+00:00 https://securityintelligence.com/how-to-check-for-blind-spots-in-your-security-program/ www.secnews.physaphae.fr/article.php?IdArticle=950417 False None None None Security Intelligence - Site de news Américain How Alex Rombak Uses His Hospitality Background to Provide Top Tier Technical Support Alex Rombak has heard your jokes about tech support, and he doesn't mind. He knows the important role he plays in supply chain security, supporting financial institutions when things go wrong. ]]> 2018-12-14T14:15:02+00:00 https://securityintelligence.com/how-alex-rombak-uses-his-hospitality-background-to-provide-top-tier-technical-support/ www.secnews.physaphae.fr/article.php?IdArticle=946207 False None None None Security Intelligence - Site de news Américain 3 Keys to Building a Scalable Incident Response Automation and Orchestration Plan A robust, documented incident response plan is the foundation of a successful automation and orchestration program - but where do you begin? ]]> 2018-12-14T12:50:01+00:00 https://securityintelligence.com/3-keys-to-building-a-scalable-incident-response-automation-and-orchestration-plan/ www.secnews.physaphae.fr/article.php?IdArticle=945961 False None None None Security Intelligence - Site de news Américain Stay on Top of Zero-Day Malware Attacks With Smart Mobile Threat Defense Mobile threats are growing both in number and severity. To protect crucial data, organizations need mobile threat defense solutions that can replicate the accuracy of manual analysis on a large scale. ]]> 2018-12-14T12:20:02+00:00 https://securityintelligence.com/stay-on-top-of-zero-day-malware-attacks-with-smart-mobile-threat-defense/ www.secnews.physaphae.fr/article.php?IdArticle=945962 False Malware,Threat None None Security Intelligence - Site de news Américain Overcoming the Cloud Security Compliance Conundrum Compliance with various regulations and cloud security requirements has expanded as technology and cloud uptake advance, leaving organizations with a challenging conundrum to solve. ]]> 2018-12-13T13:05:01+00:00 https://securityintelligence.com/overcoming-the-cloud-security-compliance-conundrum/ www.secnews.physaphae.fr/article.php?IdArticle=944119 False None None None Security Intelligence - Site de news Américain 3 Security Business Benefits From a 2018 Gartner Magic Quadrant SIEM Leader The main characteristics of a SIEM leader are centered around innovation in early threat detection, adaptation to customer environments and strong market presence. ]]> 2018-12-12T16:45:02+00:00 https://securityintelligence.com/3-security-business-benefits-from-a-2018-gartner-magic-quadrant-siem-leader/ www.secnews.physaphae.fr/article.php?IdArticle=942997 False Threat,Guideline None 3.0000000000000000 Security Intelligence - Site de news Américain Think Your Network Is Safe? If You Don\'t Have Visibility Into Hardware Vulnerabilities, Think Again 2018-12-12T12:05:01+00:00 https://securityintelligence.com/think-your-network-is-safe-if-you-dont-have-visibility-into-hardware-vulnerabilities-think-again/ www.secnews.physaphae.fr/article.php?IdArticle=942999 False None None 3.0000000000000000 Security Intelligence - Site de news Américain Why You Need a BGP Hijack Response Plan BGP hijack attacks are increasing in popularity, but are still largely unaddressed in many organizational incident response plans. ]]> 2018-12-11T12:20:02+00:00 https://securityintelligence.com/why-you-need-a-bgp-hijack-response-plan/ www.secnews.physaphae.fr/article.php?IdArticle=943000 False None None 2.0000000000000000 Security Intelligence - Site de news Américain Avoid Coal in Your Digital Stocking - Here\'s How to Improve Your Security Posture in 2019 2018-12-10T13:05:01+00:00 https://securityintelligence.com/dont-get-coal-in-your-digital-stocking-heres-how-to-improve-your-security-posture-in-2019/ www.secnews.physaphae.fr/article.php?IdArticle=943001 False None None 4.0000000000000000 Security Intelligence - Site de news Américain The Simpler the Better? Looking Deeper Into the Malware Used in Brazilian Financial Cybercrime The majority of financial cybercrime risks can be mitigated with continued user education and by placing the right controls on user devices to help protect against malware. ]]> 2018-12-10T12:10:02+00:00 https://securityintelligence.com/the-simpler-the-better-looking-deeper-into-the-malware-used-in-brazilian-financial-cybercrime/ www.secnews.physaphae.fr/article.php?IdArticle=943002 False Malware None 4.0000000000000000 Security Intelligence - Site de news Américain How Tomer Agayev Fights Financial Fraud Through Curiosity, Suspicion and Education As threat research team lead at Trusteer, Tomer guards the gateway to both known and unknown threats and passes along his insights to help banking customers protect themselves from social engineering. ]]> 2018-12-07T15:35:01+00:00 https://securityintelligence.com/how-tomer-agayev-fights-financial-fraud-through-curiosity-suspicion-and-education/ www.secnews.physaphae.fr/article.php?IdArticle=939686 False Threat,Guideline None None Security Intelligence - Site de news Américain Data Privacy Must Evolve Beyond Confidentiality Most security systems are built with data confidentiality in mind, but effective data privacy will also emphasize integrity and availability. ]]> 2018-12-07T13:50:01+00:00 https://securityintelligence.com/data-privacy-must-evolve-beyond-confidentiality/ www.secnews.physaphae.fr/article.php?IdArticle=939397 False None None None Security Intelligence - Site de news Américain Protect the Keys to Your Kingdom With Privileged Access Management The importance of implementing privileged access management (PAM) is undeniable. But how are organizations doing with actually implementing PAM solutions? ]]> 2018-12-07T12:05:01+00:00 https://securityintelligence.com/protect-the-keys-to-your-kingdom-with-privileged-access-management/ www.secnews.physaphae.fr/article.php?IdArticle=939249 False None None None Security Intelligence - Site de news Américain 5 More Retail Cybersecurity Practices to Keep Your Data Safe Beyond the Holidays These five retail cybersecurity tips will help organizations mitigate cyberattacks and provide customers with the safest shopping experience during the holiday season. ]]> 2018-12-06T13:00:02+00:00 https://securityintelligence.com/5-more-retail-cybersecurity-practices-to-keep-your-data-safe-beyond-the-holidays/ www.secnews.physaphae.fr/article.php?IdArticle=937387 False None None None Security Intelligence - Site de news Américain Machine Learning Algorithms Are Not One-Size-Fits-All Before you can choose the right machine learning algorithms to serve your business' needs, you must understand the type of problem you're trying to solve and the type of training data you'll need. ]]> 2018-12-06T12:50:02+00:00 https://securityintelligence.com/machine-learning-algorithms-are-not-one-size-fits-all/ www.secnews.physaphae.fr/article.php?IdArticle=937388 False None None None Security Intelligence - Site de news Américain Advancing Security Operations Through the Power of a SIEM Platform Thanks to a wealth of new capabilities, security operations teams that leverage a cutting-edge SIEM platform are better armed to defend their organizations from advanced and insider threats. ]]> 2018-12-05T17:55:01+00:00 https://securityintelligence.com/advancing-security-operations-through-the-power-of-an-siem-platform/ www.secnews.physaphae.fr/article.php?IdArticle=935883 False None None None Security Intelligence - Site de news Américain Endpoint Management Missteps in the \'Die Hard\' Franchise: Viewing a Holiday Favorite Through a Cybersecurity Lens 2018-12-05T14:45:01+00:00 https://securityintelligence.com/endpoint-management-missteps-in-the-die-hard-franchise-viewing-a-holiday-favorite-through-a-cybersecurity-lens/ www.secnews.physaphae.fr/article.php?IdArticle=935720 False None None None Security Intelligence - Site de news Américain How Can Government Security Teams Overcome Obstacles in IT Automation Deployment? IT automation is the future of security programs, but it's not simply plug-and-play. SOC leaders must implement this technology thoughtfully to unlock the full range of benefits. ]]> 2018-12-05T12:40:01+00:00 https://securityintelligence.com/how-can-government-security-teams-overcome-obstacles-in-it-automation-deployment/ www.secnews.physaphae.fr/article.php?IdArticle=935427 False Guideline None None Security Intelligence - Site de news Américain Achieve Community Immunity With Security Data Integration With many enterprises unable to fill open roles for cybersecurity professionals, how can organizations boost collaboration to share security data and drive better outcomes? ]]> 2018-12-04T12:40:02+00:00 https://securityintelligence.com/achieve-community-immunity-with-security-data-integration/ www.secnews.physaphae.fr/article.php?IdArticle=933758 False None None None Security Intelligence - Site de news Américain A New Privacy Frontier: Protect Your Organization\'s Gold With These 5 Data Risk Management Tips 2018-12-04T11:45:02+00:00 https://securityintelligence.com/a-new-privacy-frontier-protect-your-organizations-gold-with-these-5-data-risk-management-tips/ www.secnews.physaphae.fr/article.php?IdArticle=933645 False None None None Security Intelligence - Site de news Américain \'Tis the Season for Spreading Ad Malware 2018-12-03T13:15:02+00:00 https://securityintelligence.com/tis-the-season-for-spreading-ad-malware/ www.secnews.physaphae.fr/article.php?IdArticle=932189 False Malware None 5.0000000000000000 Security Intelligence - Site de news Américain Cross-Industry Approaches to Managing Potentially Catastrophic Cyber Risks In the security industry there is a range of cyber risks that can cause catastrophic damage to a business. What can we learn from other industries that manage these kinds of risks? ]]> 2018-12-03T12:30:02+00:00 https://securityintelligence.com/cross-industry-approaches-to-managing-potentially-catastrophic-cyber-risks/ www.secnews.physaphae.fr/article.php?IdArticle=932078 False None None None Security Intelligence - Site de news Américain Fight Evolving Cybersecurity Threats With a One-Two-Three Punch Collaborative industry partnerships, a hardened attack surface and a well-practiced incident response plan are all critical in the fight against emerging cybersecurity threats. ]]> 2018-12-03T12:05:02+00:00 https://securityintelligence.com/fight-evolving-cybersecurity-threats-with-a-one-two-three-punch/ www.secnews.physaphae.fr/article.php?IdArticle=932079 False None None None Security Intelligence - Site de news Américain 5 Tips for Uncovering Hidden Cyberthreats with DNS Analytics By understanding the basics of DNS analytics, the common methods of attack and the tools available to security teams, you will be better prepared to protect your enterprise from hidden cyberthreats. ]]> 2018-11-30T13:10:02+00:00 https://securityintelligence.com/5-tips-for-uncovering-hidden-cyberthreats-with-dns-analytics/ www.secnews.physaphae.fr/article.php?IdArticle=927847 False None None None Security Intelligence - Site de news Américain How to Future-Proof Your Enterprise With Quantum-Safe Cryptography Organizations that act now to upgrade to quantum-safe cryptography will be better positioned to reap the benefits of this emerging technology in the coming decades. ]]> 2018-11-30T12:55:01+00:00 https://securityintelligence.com/how-to-future-proof-your-enterprise-with-quantum-safe-cryptography/ www.secnews.physaphae.fr/article.php?IdArticle=927682 False None None None Security Intelligence - Site de news Américain Insights From European Customers on Cybersecurity and Security Awareness Hot topics of conversation around European Cyber Security Month (ECSM) included the challenges and opportunities of cybersecurity, the blurred line between the good guys and bad actors, and more. ]]> 2018-11-30T12:30:02+00:00 https://securityintelligence.com/insights-from-european-customers-on-cybersecurity-and-security-awareness/ www.secnews.physaphae.fr/article.php?IdArticle=927683 False None None None Security Intelligence - Site de news Américain 5 Recommendations to Improve Retail Cybersecurity This Holiday Season With extra web traffic and high order volumes coming in, the holiday shopping season can be a particularly perilous time for retail cybersecurity. ]]> 2018-11-29T13:30:03+00:00 https://securityintelligence.com/5-recommendations-to-improve-retail-cybersecurity-this-holiday-season/ www.secnews.physaphae.fr/article.php?IdArticle=926132 False None None None Security Intelligence - Site de news Américain How Daniel Gor Helps Protect the World - and His Grandparents - From Financial Fraud If you've ever gotten a financial fraud alert from your bank, you can thank Daniel Gor for developing the automated processes by which fraud analysts monitor customers' behavioral patterns. ]]> 2018-11-29T12:05:01+00:00 https://securityintelligence.com/how-daniel-gor-helps-protect-the-world-and-his-grandparents-from-financial-fraud/ www.secnews.physaphae.fr/article.php?IdArticle=926016 False None None None Security Intelligence - Site de news Américain Phish or Fox? A Penetration Testing Case Study From IBM X-Force Red The IBM X-Force Red team recently ran into trouble on a black-box penetration testing assignment. Here's how the testers overcame the obstacles to ultimately establish a solid adversarial operation. ]]> 2018-11-28T13:15:02+00:00 https://securityintelligence.com/phish-or-fox-a-penetration-testing-case-study-from-ibm-x-force-red/ www.secnews.physaphae.fr/article.php?IdArticle=924033 False None None None Security Intelligence - Site de news Américain Why Is the Retail Industry Still Lacking Security? A recent survey found that the retail industry is among the least secure industries. What can retailers do to turn that around this holiday season? ]]> 2018-11-28T13:10:02+00:00 https://securityintelligence.com/why-is-the-retail-industry-still-lacking-security/ www.secnews.physaphae.fr/article.php?IdArticle=924034 False None None None Security Intelligence - Site de news Américain Is Your SOC Overwhelmed? Artificial Intelligence and MITRE ATT&CK Can Help Lighten the Load 2018-11-28T13:00:02+00:00 https://securityintelligence.com/is-your-soc-overwhelmed-artificial-intelligence-and-mitre-attck-can-help-lighten-the-load/ www.secnews.physaphae.fr/article.php?IdArticle=924035 False Threat None None Security Intelligence - Site de news Américain How to Defend Against Malvertising Drive-By Attacks Malvertising - malware delivered by internet advertisements - can infect your computer even if you don't click on it. But there are steps you can take to protect yourself now. ]]> 2018-11-27T17:30:01+00:00 https://securityintelligence.com/how-to-defend-against-malvertising-drive-by-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=922537 False Malware None None Security Intelligence - Site de news Américain Retail Security Hygiene: The Case for Seasonal Checkups Retail companies should conduct security hygiene checkups as early as possible this holiday season to identify key threats across e-commerce systems, seasonal staffing policies and employee behaviors. ]]> 2018-11-27T13:00:02+00:00 https://securityintelligence.com/retail-security-hygiene-the-case-for-seasonal-checkups/ www.secnews.physaphae.fr/article.php?IdArticle=922228 False None None None Security Intelligence - Site de news Américain We Need to Talk About NIST\'s Dropped Password Management Recommendations 2018-11-26T12:35:02+00:00 https://securityintelligence.com/we-need-to-talk-about-nists-dropped-password-management-recommendations/ www.secnews.physaphae.fr/article.php?IdArticle=920383 False None None None Security Intelligence - Site de news Américain How to Prepare for the Coming 5G Security Threats 5G communications networks will empower a future that some are calling the "Fourth Industrial Revolution" - but security leaders must prepare for the coming 5G security threats. ]]> 2018-11-26T12:20:03+00:00 https://securityintelligence.com/how-to-prepare-for-the-coming-5g-security-threats/ www.secnews.physaphae.fr/article.php?IdArticle=920384 False Guideline None None Security Intelligence - Site de news Américain How Cloud Security Architect Andi Hudson Nurtures Today\'s Youth to Protect Tomorrow\'s Data 2018-11-22T12:15:02+00:00 https://securityintelligence.com/how-cloud-security-architect-andi-hudson-nurtures-todays-youth-to-protect-tomorrows-data/ www.secnews.physaphae.fr/article.php?IdArticle=912100 False None None None Security Intelligence - Site de news Américain Cyber Monday 2018: 5 Best Practices to Protect Consumer Data Cyber Monday 2018 is just around the corner, and customers and malicious actors alike are gearing up. Is your retail security ready to tackle e-commerce fraud and improve consumer data protection? ]]> 2018-11-21T14:00:02+00:00 https://securityintelligence.com/cyber-monday-2018-5-best-practices-to-protect-consumer-data/ www.secnews.physaphae.fr/article.php?IdArticle=910202 False None None None Security Intelligence - Site de news Américain The Forrester Wave: Unified Endpoint Management, Q4 2018 - New Acronyms, New Leaders and How Device Management Has Evolved IBM was named a leader in the "2018 Forrester Wave: Unified Endpoint Management, Q4 2018" report, and MaaS360 earned recognition as the best current offering in the marketplace. ]]> 2018-11-21T14:00:02+00:00 https://securityintelligence.com/the-forrester-wave-unified-endpoint-management-q4-2018-new-acronyms-new-leaders-and-how-device-management-has-evolved/ www.secnews.physaphae.fr/article.php?IdArticle=910201 False Guideline None None Security Intelligence - Site de news Américain Easy Does It! A Timely Look Into Fraud TTPs in the Brazilian Financial Cybercrime Landscape In this first article of a two-part series, IBM X-Force exposes some of its research on the typical malware and tactics, techniques and procedures (TTPs) used in Brazilian financial cybercrime. ]]> 2018-11-21T12:50:02+00:00 https://securityintelligence.com/easy-does-it-a-timely-look-into-fraud-ttps-in-the-brazilian-financial-cybercrime-landscape/ www.secnews.physaphae.fr/article.php?IdArticle=910075 False Malware None None Security Intelligence - Site de news Américain Why You Should Act Now to Prevent Peer-to-Peer Payments Network Fraud Financial institutions seeking a piece of the hot P2P payments market must act to prevent network fraud with a multilayered prevention approach that includes a robust fraud detection engine. ]]> 2018-11-20T14:45:01+00:00 https://securityintelligence.com/why-you-should-act-now-to-prevent-peer-to-peer-payments-network-fraud/ www.secnews.physaphae.fr/article.php?IdArticle=908735 False None None None Security Intelligence - Site de news Américain Retail Cybersecurity Is Lagging in the Digital Transformation Race, and Attackers Are Taking Advantage Retail cybersecurity requires a large-scale transition to cope with new threat vectors, close significant infrastructure gaps, and extend security protocols across new cloud and SaaS platforms. ]]> 2018-11-19T14:00:02+00:00 https://securityintelligence.com/retail-cybersecurity-is-lagging-in-the-digital-transformation-race-and-attackers-are-taking-advantage/ www.secnews.physaphae.fr/article.php?IdArticle=906687 False Threat None None Security Intelligence - Site de news Américain Soft Skills, Solid Benefits: Cybersecurity Staffing Shifts Gears to Bring in New Skill Sets It's time to prioritize soft skills, re-evaluate recruitment practices and prepare for a future where the hard skills of AI-enhanced tools require a soft-side balance to drive cybersecurity success. ]]> 2018-11-19T12:10:02+00:00 https://securityintelligence.com/soft-skills-solid-benefits-cybersecurity-staffing-shifts-gears-to-bring-in-new-skill-sets/ www.secnews.physaphae.fr/article.php?IdArticle=906548 False None None None Security Intelligence - Site de news Américain How to Stay One Step Ahead of Phishing Websites - Literally Ahead-of-threat detection enables security professionals and consumers to identify potential phishing websites faster than traditional browser protection apps can blacklist active cyberthreats. ]]> 2018-11-16T15:10:02+00:00 https://securityintelligence.com/how-to-stay-one-step-ahead-of-phishing-websites-literally/ www.secnews.physaphae.fr/article.php?IdArticle=900657 False None None None Security Intelligence - Site de news Américain How to Choose the Right Artificial Intelligence Solution for Your Security Problems If you're thinking about adopting artificial intelligence as an ally in your security operations center, the following questions and considerations can be helpful to guide your decision-making. ]]> 2018-11-16T14:15:01+00:00 https://securityintelligence.com/how-to-choose-the-right-artificial-intelligence-solution-for-your-security-problems/ www.secnews.physaphae.fr/article.php?IdArticle=900585 False None None None Security Intelligence - Site de news Américain Why the EU Is More Likely to Drive IT and Security Trends Than the US EU companies are far ahead of their U.S. counterparts in terms of adopting IT and security trends, according to recent research. ]]> 2018-11-16T13:00:01+00:00 https://securityintelligence.com/why-the-eu-is-more-likely-to-drive-it-and-security-trends-than-the-us/ www.secnews.physaphae.fr/article.php?IdArticle=900462 False None None None Security Intelligence - Site de news Américain 4 Tips to Make the Most of Your Security Budget Getting an increase security budget approved is one thing; spending it effectively is another challenge altogether. Follow these tips to get the most value out of your SOC's funds. ]]> 2018-11-15T14:20:02+00:00 https://securityintelligence.com/4-tips-to-make-the-most-of-your-security-budget/ www.secnews.physaphae.fr/article.php?IdArticle=898323 False None None None Security Intelligence - Site de news Américain Why User Behavior Analytics Is an Application, Not a Cybersecurity Platform User behavior analytics (UBA) is a good application, but it isn't a replacement for SIEM. UBA is more accurately described as a cybersecurity application that can be added on top of an SIEM tool. ]]> 2018-11-14T14:00:02+00:00 https://securityintelligence.com/why-user-behavior-analytics-is-an-application-not-a-cybersecurity-platform/ www.secnews.physaphae.fr/article.php?IdArticle=896313 False None None None Security Intelligence - Site de news Américain How Can Industry Leaders and Academia Help Improve Cybersecurity Education? It's up to security and educational leaders alike to improve and expand opportunities for cybersecurity education. ]]> 2018-11-14T12:05:01+00:00 https://securityintelligence.com/how-can-industry-leaders-and-academia-help-improve-cybersecurity-education/ www.secnews.physaphae.fr/article.php?IdArticle=896180 False Guideline None None Security Intelligence - Site de news Américain As Mobile Security Challenges Mount, How Can CIOs and CISOs Eliminate Blind Spots? With modern mobile security challenges demanding a deeper level of visibility, policy and protection, organizations must invest in advanced unified endpoint management (UEM) solutions. ]]> 2018-11-13T14:00:02+00:00 https://securityintelligence.com/as-mobile-security-challenges-mount-how-can-cios-and-cisos-eliminate-blind-spots/ www.secnews.physaphae.fr/article.php?IdArticle=894726 False None None None Security Intelligence - Site de news Américain How to Stop Mobile Apps That Steal One of the best ways for cybercriminals to deliver a payload on your organization's network is to smuggle it inside your employees' mobile apps. ]]> 2018-11-13T12:00:02+00:00 https://securityintelligence.com/how-to-stop-mobile-apps-that-steal/ www.secnews.physaphae.fr/article.php?IdArticle=894600 False None None None Security Intelligence - Site de news Américain Busting Cybersecurity Silos To break down cybersecurity silos, professionals must work together to share security information and build collaborative solutions to address the evolving cybersecurity threat landscape. ]]> 2018-11-12T17:00:02+00:00 https://securityintelligence.com/busting-cybersecurity-silos/ www.secnews.physaphae.fr/article.php?IdArticle=893215 False Threat None None Security Intelligence - Site de news Américain Trusting Security Metrics: How Well Do We Know What We Think We Know? When it comes to security metrics, greater accuracy yeilds greater value, but complete context requires a diversity of insights. What if you can't have both? ]]> 2018-11-12T13:00:02+00:00 https://securityintelligence.com/trusting-security-metrics-how-well-do-we-know-what-we-think-we-know/ www.secnews.physaphae.fr/article.php?IdArticle=892891 False None None None Security Intelligence - Site de news Américain How Emerging Technologies Can Unexpectedly Advance - Or Impede - Cybersecurity Gender Inclusion It's up to all of us to implement the waves of emerging security technologies and processes in ways that encourage, not impede, greater gender inclusion. ]]> 2018-11-09T12:55:01+00:00 https://securityintelligence.com/how-emerging-technologies-can-unexpectedly-advance-or-impede-cybersecurity-gender-inclusion/ www.secnews.physaphae.fr/article.php?IdArticle=888458 False None None None Security Intelligence - Site de news Américain How Can Companies Move the Needle on Enterprise Cloud Security Risks and Compliance? Traditional vulnerability assessments don't always show the full picture of cloud security, compliance and risk. How can enterprises get ahead of the curve? ]]> 2018-11-09T12:50:02+00:00 https://securityintelligence.com/how-can-companies-move-the-needle-on-enterprise-cloud-security-risks-and-compliance/ www.secnews.physaphae.fr/article.php?IdArticle=888373 False Vulnerability None None Security Intelligence - Site de news Américain Why You Should Start Leveraging Network Flow Data Before the Next Big Breach One of the most crucial types of information for threat detection and incident response is network flow data, which has several unique properties that can help security analysts uncover attacks. ]]> 2018-11-09T12:40:01+00:00 https://securityintelligence.com/why-you-should-start-leveraging-network-flow-data-before-the-next-big-breach/ www.secnews.physaphae.fr/article.php?IdArticle=888374 False Threat None None Security Intelligence - Site de news Américain Top 5 Reasons to Attend the IBM Security Sessions at Think 2019 As you consider the various IT security events happening next year, here are five key reasons why you should attend some of the compelling IBM Security sessions planned at Think 2019. ]]> 2018-11-08T12:40:02+00:00 https://securityintelligence.com/top-5-reasons-to-attend-the-ibm-security-sessions-at-think-2019/ www.secnews.physaphae.fr/article.php?IdArticle=886634 False None None None Security Intelligence - Site de news Américain Digital Identity Trust: A New Way to Authenticate When building digital identity trust, security teams have historically struggled to find a balance between security and customer convenience. But what if they could have both? ]]> 2018-11-08T11:00:03+00:00 https://securityintelligence.com/digital-identity-trust-a-new-way-to-authenticate/ www.secnews.physaphae.fr/article.php?IdArticle=886365 False None None None Security Intelligence - Site de news Américain How Business Continuity Management Boosts Value in Your Security Program A proactive, integrated business continuity management process will significantly boost the efficiency and value of your overall security program, according to the "2018 Cost of Data Breach Study." ]]> 2018-11-07T14:00:02+00:00 https://securityintelligence.com/how-business-continuity-management-boosts-value-in-your-security-program/ www.secnews.physaphae.fr/article.php?IdArticle=884846 False Data Breach None None Security Intelligence - Site de news Américain How to Reduce Hidden Endpoint Management Costs and Increase Efficiency To reduce hidden endpoint management costs, look for solutions that give you comprehensive visibility into your endpoint landscape and enable you to consolidate tools and increase efficiency. ]]> 2018-11-07T12:10:02+00:00 https://securityintelligence.com/how-to-reduce-hidden-endpoint-management-costs-and-increase-efficiency/ www.secnews.physaphae.fr/article.php?IdArticle=884762 False None None None Security Intelligence - Site de news Américain A Fun and Educational Answer to the Security Awareness Problem: The Security Escape Room A security escape room can be a fun and interactive way to train employees on various security concepts they might otherwise ignore. ]]> 2018-11-06T14:00:03+00:00 https://securityintelligence.com/a-fun-and-educational-answer-to-the-security-awareness-problem-the-security-escape-room/ www.secnews.physaphae.fr/article.php?IdArticle=882857 False None None None Security Intelligence - Site de news Américain How to Use Passive DNS to Inform Your Incident Response Passive DNS replication can be an essential source of data to contextualize your threat intelligence and inform your incident response plan. ]]> 2018-11-05T13:05:02+00:00 https://securityintelligence.com/how-to-use-passive-dns-to-inform-your-incident-response/ www.secnews.physaphae.fr/article.php?IdArticle=880865 False Threat None None Security Intelligence - Site de news Américain 3 Creative Strategies to Narrow the Skills Gap The cybersecurity skills gap will continue to grow until executive leadership takes more creative steps to narrow it. ]]> 2018-11-05T13:05:02+00:00 https://securityintelligence.com/3-creative-strategies-to-narrow-the-skills-gap/ www.secnews.physaphae.fr/article.php?IdArticle=880866 False Guideline None None Security Intelligence - Site de news Américain How an IoT Botnet Could Breach the Power Grid and Cause Widespread Blackouts A group of researchers from Princeton revealed that, through an attack dubbed MadIoT, threat actors could leverage an IoT botnet to compromise the power grid and cause widespread blackouts. ]]> 2018-11-02T15:25:01+00:00 https://securityintelligence.com/how-an-iot-botnet-could-breach-the-power-grid-and-cause-widespread-blackouts/ www.secnews.physaphae.fr/article.php?IdArticle=876458 False Threat None None Security Intelligence - Site de news Américain Why You Should Seek Out Alternative Intelligence in Your Cybersecurity Recruitment With constantly evolving threats and a growing skills gap, the cybersecurity industry should consider alternative intelligence to enable the full digital transformation of our organizations. ]]> 2018-11-02T12:45:01+00:00 https://securityintelligence.com/why-you-should-seek-out-alternative-intelligence-in-your-cybersecurity-recruitment/ www.secnews.physaphae.fr/article.php?IdArticle=876275 False None None None Security Intelligence - Site de news Américain How to Boost Your Data Privacy With a Virtual Private Network Using a virtual private network (VPN) to obfuscate your location and encrypt data is a powerful way to boost data privacy and prevent the tracking, stalking and theft of personal information. ]]> 2018-11-02T12:40:03+00:00 https://securityintelligence.com/how-to-boost-your-data-privacy-with-a-virtual-private-network/ www.secnews.physaphae.fr/article.php?IdArticle=876276 False None None None Security Intelligence - Site de news Américain How Dimitry Snezhkov Balances the Yin and Yang of Penetration Testing Dimitry Snezhkov didn't touch a computer until he was 18. Now he spends his days penetration testing to uncover security gaps and his nights meditating on the balance of life. ]]> 2018-11-01T12:15:02+00:00 https://securityintelligence.com/how-dimitry-snezhkov-balances-the-yin-and-yang-of-penetration-testing/ www.secnews.physaphae.fr/article.php?IdArticle=874345 False None None None Security Intelligence - Site de news Américain 4 Hard-Learned Lessons for CISOs Learn these lessons for CISOs before they hitch your security strategy. ]]> 2018-11-01T11:55:01+00:00 https://securityintelligence.com/4-hard-learned-lessons-for-cisos/ www.secnews.physaphae.fr/article.php?IdArticle=874276 False None None None Security Intelligence - Site de news Américain Major Application Security Oversights You Can\'t Afford 2018-10-31T12:50:01+00:00 https://securityintelligence.com/major-application-security-oversights-you-cant-afford/ www.secnews.physaphae.fr/article.php?IdArticle=872543 False None None None Security Intelligence - Site de news Américain How to Develop an Immersive Cybersecurity Simulation A well-planned cybersecurity simulation can help the entire organization, from incident responders to top leadership, practice their crisis management skills in a low-stakes yet immersive environment. ]]> 2018-10-31T11:30:01+00:00 https://securityintelligence.com/how-to-develop-an-immersive-cybersecurity-simulation/ www.secnews.physaphae.fr/article.php?IdArticle=872406 False Guideline None None Security Intelligence - Site de news Américain How Much Is Endpoint Management Really Costing You? Many organizations are paying much more than they realize for endpoint management in terms of money, resources and speed. Where do these hidden costs come from, and how can companies reduce them? ]]> 2018-10-31T10:55:01+00:00 https://securityintelligence.com/how-much-is-endpoint-management-really-costing-you/ www.secnews.physaphae.fr/article.php?IdArticle=872281 False None None None Security Intelligence - Site de news Américain How SEO Poisoning Campaigns Are Mounting a Comeback SEO poisoning is on the rise again. How do threat actors use search engine results to drive victims to malicious sites, and what can users do to protect themselves? ]]> 2018-10-30T12:25:01+00:00 https://securityintelligence.com/how-seo-poisoning-campaigns-are-mounting-a-comeback/ www.secnews.physaphae.fr/article.php?IdArticle=870448 False Threat None None Security Intelligence - Site de news Américain Artificial Intelligence, Real Concerns: Hype, Hope and the Hard Truth About AI With a corporate culture that supports transparency and human agency, it's possible to maximize the existing benefits of artificial intelligence (AI) while laying the groundwork for the future of AI. ]]> 2018-10-30T11:45:01+00:00 https://securityintelligence.com/artificial-intelligence-real-concerns-hype-hope-and-the-hard-truth-about-ai/ www.secnews.physaphae.fr/article.php?IdArticle=870449 False None None None Security Intelligence - Site de news Américain Data Risk Management: Circling the Wagons With Three Chief Officers Leading the Way To establish a consolidated data risk management program, the chief information security officer (CISO), chief data officer (CDO) and chief risk officer (CRO) must be on the same page. ]]> 2018-10-29T12:30:00+00:00 https://securityintelligence.com/data-risk-management-circling-the-wagons-with-three-chief-officers-leading-the-way/ www.secnews.physaphae.fr/article.php?IdArticle=868789 False None None None Security Intelligence - Site de news Américain 5 Ways CISOs Can Improve Collaboration on Security Risks While the CISO's role is more important than ever, recent studies have revealed a disconnect between CISOs and business executives and difficulities communicating security risks in business terms. ]]> 2018-10-29T11:10:02+00:00 https://securityintelligence.com/5-ways-cisos-can-improve-collaboration-on-security-risks/ www.secnews.physaphae.fr/article.php?IdArticle=868627 False Studies None None Security Intelligence - Site de news Américain Strengthening Industry Collaboration Through the Charter of Trust for a Secure Digital World Under the Charter of Trust, limiting the impact of digital transformation and cybersecurity and building trust for users has to be the result of close collaboration at all levels. ]]> 2018-10-29T11:00:04+00:00 https://securityintelligence.com/strengthening-industry-collaboration-through-the-charter-of-trust-for-a-secure-digital-world/ www.secnews.physaphae.fr/article.php?IdArticle=868791 False None None None Security Intelligence - Site de news Américain How Can Highly Regulated Industries Achieve Strong Authentication Via Mobile Devices? By embracing the dervied credentials approach to personal identity verification, companies can deliver strong authentication, scalability, adherence to NIST guidelines, and ease of use and deployment. ]]> 2018-10-26T15:45:02+00:00 https://securityintelligence.com/how-can-highly-regulated-industries-achieve-strong-authentication-via-mobile-devices-2/ www.secnews.physaphae.fr/article.php?IdArticle=864482 False None None None Security Intelligence - Site de news Américain Is Malware Analysis Right for Your Business? For companies that want to understand what is happening in their networks but lack malware analysis tools, using what is publicly available could be the difference between an infection and a crisis. ]]> 2018-10-26T11:15:01+00:00 https://securityintelligence.com/is-malware-analysis-right-for-your-business/ www.secnews.physaphae.fr/article.php?IdArticle=864069 False Malware None None Security Intelligence - Site de news Américain 3 Novel Ways to Use Blockchain for Business Across Industries By leveraging blockchain for business, organizations can clarify historical records and streamline transactions while significantly boosting overall enterprise security. ]]> 2018-10-26T11:10:02+00:00 https://securityintelligence.com/3-novel-ways-to-use-blockchain-for-business-across-industries/ www.secnews.physaphae.fr/article.php?IdArticle=864070 False None None None Security Intelligence - Site de news Américain How to Secure Mobile Messaging in Your Enterprise Two decades ago, AOL's Instant Messenger changed the way we communicate. Today, mobile messaging is more popular than ever - but not much more secure. ]]> 2018-10-26T11:00:01+00:00 https://securityintelligence.com/how-to-secure-mobile-messaging-in-your-enterprise/ www.secnews.physaphae.fr/article.php?IdArticle=863982 False None None None Security Intelligence - Site de news Américain How Security Consultant Ben Goodrich Uses Physics to Navigate the State of Constant Change in Cybersecurity Just three years ago Ben Goodrich graduated with a degree in physics. Today he's a security consultant working with the world's biggest companies to provide an injection of cybersecurity expertise. ]]> 2018-10-25T10:55:02+00:00 https://securityintelligence.com/how-security-consultant-ben-goodrich-uses-physics-to-navigate-the-state-of-constant-change-in-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=862155 False None None None Security Intelligence - Site de news Américain Why Security Career Journeys Need to Start From an Early Age Encouraging young people to pursue a security career is not just the job of the public sector. Organizations that hire security professionals also have a responsibility to help grow this talent pool. ]]> 2018-10-25T10:10:01+00:00 https://securityintelligence.com/why-security-career-journeys-need-to-start-from-an-early-age/ www.secnews.physaphae.fr/article.php?IdArticle=863984 False None None None Security Intelligence - Site de news Américain How can highly regulated industries achieve strong authentication via mobile devices? In effort to secure sensitive data and protect critical assets, IT & Security leaders in highly regulated industries, including the US Federal government, mandate strong authentication tied to... ]]> 2018-10-24T15:30:02+00:00 https://securityintelligence.com/how-can-highly-regulated-industries-achieve-strong-authentication-via-mobile-devices/ www.secnews.physaphae.fr/article.php?IdArticle=860542 False Guideline None None Security Intelligence - Site de news Américain The Imperative and Opportunity of Ruggedized and IoT Device Management Increasingly, businesses are focusing more on ruggedized and IoT device management, compliance of their endpoints, and developing an overall strategy to secure these types of devices. ]]> 2018-10-24T12:15:01+00:00 https://securityintelligence.com/the-imperative-and-opportunity-of-ruggedized-and-iot-device-management/ www.secnews.physaphae.fr/article.php?IdArticle=860252 False None None None Security Intelligence - Site de news Américain Overcoming the Electronics Industry\'s Insecurity Over Industrial IoT Deployments 2018-10-24T11:45:01+00:00 https://securityintelligence.com/overcoming-the-electronics-industrys-insecurity-over-industrial-iot-deployments/ www.secnews.physaphae.fr/article.php?IdArticle=860184 False None None None Security Intelligence - Site de news Américain Cyber War Games: Top Payment Companies Collaborate to Respond to Financial Cyberattacks In addition to targeted attacks, organizations in the financial services industry also face the threat of systemic financial cyberattacks. But are companies prepared for this type of threat? ]]> 2018-10-24T11:25:01+00:00 https://securityintelligence.com/cyber-war-games-top-payment-companies-collaborate-to-respond-to-financial-cyberattacks/ www.secnews.physaphae.fr/article.php?IdArticle=860185 False Threat None None Security Intelligence - Site de news Américain Why You Need to Mature Your User Behavior Analytics Deployment User behavior analytics (UBA) can help security teams uncover ignorant, negligent and malicious activity with advanced machine learning algorithms - but Rome wasn't built in a day. ]]> 2018-10-23T12:10:02+00:00 https://securityintelligence.com/why-you-need-to-mature-your-user-behavior-analytics-deployment/ www.secnews.physaphae.fr/article.php?IdArticle=858494 False None None None Security Intelligence - Site de news Américain 6 Common Myths That Could Be Holding Back Your Cybersecurity Awareness Efforts To improve the company's overall cyber resilience posture, security leaders must promote a culture of cybersecurity awareness from the top down. They can start by debunking these six common myths. ]]> 2018-10-23T12:05:01+00:00 https://securityintelligence.com/6-common-myths-that-could-be-holding-back-your-cybersecurity-awareness-efforts/ www.secnews.physaphae.fr/article.php?IdArticle=858495 False Guideline None None Security Intelligence - Site de news Américain Why You Need Advanced Authentication to Protect Identities Without Compromising User Experience Advanced authentication solutions can help mitigate the risk of fraud by detecting malicious activity without adding unwanted speed bumps to the online user experience. ]]> 2018-10-23T11:30:01+00:00 https://securityintelligence.com/why-you-need-advanced-authentication-to-protect-identities-without-compromising-user-experience/ www.secnews.physaphae.fr/article.php?IdArticle=858351 False None None None Security Intelligence - Site de news Américain What Can We All Learn From the U.S. Department of Energy\'s Cybersecurity Strategy? 2018-10-22T12:15:02+00:00 https://securityintelligence.com/what-can-we-all-learn-from-the-u-s-department-of-energys-cybersecurity-strategy/ www.secnews.physaphae.fr/article.php?IdArticle=856293 False None None None Security Intelligence - Site de news Américain IBM Security Named a Leader in IDC Incident Response MarketScape Report This year, IDC recognized IBM X-Force Incident Response and Intelligence Services (IRIS) for effectively streamlining incident response (IR) for customers around the globe. ]]> 2018-10-22T12:00:01+00:00 https://securityintelligence.com/ibm-security-named-a-leader-in-idc-incident-response-marketscape-report/ www.secnews.physaphae.fr/article.php?IdArticle=856146 False None None None