www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-09T01:47:33+00:00 www.secnews.physaphae.fr Security Intelligence - Site de news Américain Don\'t Dwell On It: How to Detect a Breach on Your Network More Efficiently 2018-10-22T10:40:02+00:00 https://securityintelligence.com/dont-dwell-on-it-how-to-detect-a-breach-on-your-network-more-efficiently/ www.secnews.physaphae.fr/article.php?IdArticle=856097 False None None None Security Intelligence - Site de news Américain How to Create Better Security Awareness Content for Your Employees Despite increased security awareness training efforts, human error is still responsible for the majority of data breaches today. ]]> 2018-10-19T12:05:01+00:00 https://securityintelligence.com/how-to-create-better-security-awareness-content-for-your-employees/ www.secnews.physaphae.fr/article.php?IdArticle=854866 False None None None Security Intelligence - Site de news Américain Wisdom of the Crowd: How the App Store Model Drives Innovation in Data Security Application developers can accelerate the pace of innovation in data security by making it easy for third parties to integrate with their platforms. ]]> 2018-10-19T11:30:02+00:00 https://securityintelligence.com/wisdom-of-the-crowd-how-the-app-store-model-drives-innovation-in-data-security/ www.secnews.physaphae.fr/article.php?IdArticle=854765 False None None None Security Intelligence - Site de news Américain Orchestrating Incident Response Beyond Triage and Enrichment Incident response orchestration can help security teams transform response across the entire incident life cycle, including automating remedial actions and mitigating future attacks. ]]> 2018-10-18T12:55:01+00:00 https://securityintelligence.com/orchestrating-incident-response-beyond-triage-and-enrichment/ www.secnews.physaphae.fr/article.php?IdArticle=853348 False None None None Security Intelligence - Site de news Américain Why Limor Golan Works Hard to Make Security Operations Easier Limor Golan is a self-described hyperactive developer who works best under stress. Trusteer was so impressed they created a role specifically for her to improve security operations through automation. ]]> 2018-10-18T11:25:01+00:00 https://securityintelligence.com/why-limor-golan-works-hard-to-make-security-operations-easier/ www.secnews.physaphae.fr/article.php?IdArticle=853226 False None None None Security Intelligence - Site de news Américain 5 Tips to Bring Colleagues on Board With Information Security Systems The more employees and business leaders are involved with your information security systems, the more long-term buy-in you'll have when it comes to following security policies and best practices. ]]> 2018-10-17T13:00:02+00:00 https://securityintelligence.com/5-tips-to-bring-colleagues-on-board-with-information-security-systems/ www.secnews.physaphae.fr/article.php?IdArticle=851671 False Guideline None None Security Intelligence - Site de news Américain Why You Should Practice and Drill to Prepare for a Cyber Emergency The U.S. Fire Administration's five key components of a fire safety education program serve as a useful framework for CISOs looking to boost their company's ability to respond to a cyber emergency. ]]> 2018-10-17T11:55:01+00:00 https://securityintelligence.com/why-you-should-practice-and-drill-to-prepare-for-a-cyber-emergency/ www.secnews.physaphae.fr/article.php?IdArticle=851581 False None None None Security Intelligence - Site de news Américain Is Employee Negligence Threatening Your Information Security? With a little education and a lot of communication, security leaders can steadily reduce employee negligence over time through consistent, comprehensive awareness training. ]]> 2018-10-17T11:15:01+00:00 https://securityintelligence.com/is-employee-negligence-threatening-your-information-security/ www.secnews.physaphae.fr/article.php?IdArticle=851582 False Guideline None None Security Intelligence - Site de news Américain Ready for Door-to-Door Delivery: Mobile Cybersecurity Simulation Training With our mobile cybersecurity simulation facility, we can bring the Cyber Range experience to a global audience, helping companies develop the mastery and skills needed for cyberattack preparedness. ]]> 2018-10-16T13:45:02+00:00 https://securityintelligence.com/ready-for-door-to-door-delivery-mobile-cybersecurity-simulation-training/ www.secnews.physaphae.fr/article.php?IdArticle=850025 False None None None Security Intelligence - Site de news Américain Simplify Your Security With an Open Cloud-Based Platform Today, we're announcing IBM Security Connect, an open, cloud-based platform that is capable of analyzing federated security data across unconnected tools and environments. ]]> 2018-10-15T19:00:02+00:00 https://securityintelligence.com/simplify-your-security-with-an-open-cloud-based-platform/ www.secnews.physaphae.fr/article.php?IdArticle=848643 False None None None Security Intelligence - Site de news Américain 3 Lessons That Are Informing the Next Generation of the Cyber Range With the success and lessons learned from our X-Force Command Cyber Range, IBM is excited to launch its new mobile command center, the X-Force Command Cyber Tactical Operations Center (C-TOC). ]]> 2018-10-15T10:05:01+00:00 https://securityintelligence.com/3-lessons-that-are-informing-the-next-generation-of-the-cyber-range/ www.secnews.physaphae.fr/article.php?IdArticle=847865 False None None None Security Intelligence - Site de news Américain Is Your Site Protected Against Drupal Security Flaws? This past summer saw a pair of Drupal security flaws exposed and patched. Is your website secure? ]]> 2018-10-12T13:10:02+00:00 https://securityintelligence.com/is-your-site-protected-against-drupal-security-flaws/ www.secnews.physaphae.fr/article.php?IdArticle=844014 False None None None Security Intelligence - Site de news Américain Were Millennials Born for a Career in Cybersecurity? From high school to higher education, there are countless opportunities for security professionals and organizations to educate young people about a career in cybersecurity. ]]> 2018-10-12T12:45:01+00:00 https://securityintelligence.com/were-millennials-born-for-a-career-in-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=843930 False None None None Security Intelligence - Site de news Américain An Increase in PowerShell Attacks: Observations From IBM X-Force IRIS Since the open source release of the PowerShell framework in 2016, IBM X-Force Incident Response and Intelligence Services (IRIS) has identified an upward trend in malicious PowerShell use. ]]> 2018-10-12T12:10:03+00:00 https://securityintelligence.com/an-increase-in-powershell-attacks-observations-from-ibm-x-force-iris/ www.secnews.physaphae.fr/article.php?IdArticle=843931 False None None None Security Intelligence - Site de news Américain Visit the Subway System of Cybercrime With Security Consultant Francisco Galian The battle stories Francisco Galian heard as a student inspired him to protect multinational networks as a security consultant. He's parachuted in when times get critical for IBM Security customers. ]]> 2018-10-12T12:05:01+00:00 https://securityintelligence.com/visit-the-subway-system-of-cybercrime-with-security-consultant-francisco-galian/ www.secnews.physaphae.fr/article.php?IdArticle=843932 False None None None Security Intelligence - Site de news Américain How to Use DNS Analytics to Find the Compromised Domain in a Billion DNS Queries Using unique methods of analyzing DNS data, advanced DNS analytics enables security teams to quickly and proactively find and eliminate potential threats. ]]> 2018-10-11T21:05:01+00:00 https://securityintelligence.com/how-to-use-dns-analytics-to-find-the-compromised-domain-in-a-billion-dns-queries/ www.secnews.physaphae.fr/article.php?IdArticle=843001 False None None None Security Intelligence - Site de news Américain Cybersecurity Future Trends: Why More Bots Means More Jobs Although AI is poised to take a much larger role in cybersecurity future trends, this doesn't necessarily mean fewer opportunities for human analysts. In fact, it could mean quite the opposite. ]]> 2018-10-11T12:15:02+00:00 https://securityintelligence.com/cybersecurity-future-trends-why-more-bots-means-more-jobs/ www.secnews.physaphae.fr/article.php?IdArticle=842123 False None None None Security Intelligence - Site de news Américain Threat Actors Prey on Drupalgeddon Vulnerability to Mass-Compromise Websites and Underlying Servers X-Force observed attackers using known Drupal vulnerabilities, including Drupalgeddon, to target websites and the underlying infrastructure that hosts them, leveraging Shellbot to open backdoors. ]]> 2018-10-10T19:10:02+00:00 https://securityintelligence.com/threat-actors-prey-on-drupalgeddon-vulnerability-to-mass-compromise-websites-and-underlying-servers/ www.secnews.physaphae.fr/article.php?IdArticle=840955 False Vulnerability,Threat None None Security Intelligence - Site de news Américain The Many Faces of Necurs: How the Botnet Spewed Millions of Spam Emails for Cyber Extortion IBM X-Force researchers observed the Necurs botnet spewing millions of spam emails from more than 30,000 malicious IPs to extort bitcoin from victims who may or may not have viewed adult content. ]]> 2018-10-10T14:05:02+00:00 https://securityintelligence.com/the-many-faces-of-necurs-how-the-botnet-spewed-millions-of-spam-emails-for-cyber-extortion/ www.secnews.physaphae.fr/article.php?IdArticle=840596 False Spam None None Security Intelligence - Site de news Américain How to Land an Entry-Level Cybersecurity Job Cybersecurity is still a fresh, growing and evolving industry. Finding the right entry-level cybersecurity job now can help you shape your career in this burgeoning field for years to come. ]]> 2018-10-10T12:00:02+00:00 https://securityintelligence.com/how-to-land-an-entry-level-cybersecurity-job/ www.secnews.physaphae.fr/article.php?IdArticle=840268 False None None None Security Intelligence - Site de news Américain How to Avoid the Trap of Fragmented Security Analytics To move toward deep, advanced security analytics, CISOs should replace their fragmented tools with a platform-based approach that can leverage a broad set of data. ]]> 2018-10-09T11:55:01+00:00 https://securityintelligence.com/how-to-avoid-the-trap-of-fragmented-security-analytics/ www.secnews.physaphae.fr/article.php?IdArticle=838372 False None None None Security Intelligence - Site de news Américain Out With the Old, In With the New: Separation of Duties the Right Way The capacity to express technical IT concepts in business terms is critical to a better, more informed decision-making process when it comes to user access and separation of duties. ]]> 2018-10-09T11:50:01+00:00 https://securityintelligence.com/out-with-the-old-in-with-the-new-separation-of-duties-the-right-way/ www.secnews.physaphae.fr/article.php?IdArticle=840270 False None None None Security Intelligence - Site de news Américain Does Your SOC Have a Security Playbook? By creating, regularly reviewing and maintaining a security playbook, SOC leaders can position analysts to execute incident response processes more quickly and effectively. ]]> 2018-10-08T12:30:02+00:00 https://securityintelligence.com/does-your-soc-have-a-security-playbook/ www.secnews.physaphae.fr/article.php?IdArticle=836635 False Guideline None None Security Intelligence - Site de news Américain Cybersecurity Skills Aren\'t Just for Security Professionals Anymore 2018-10-08T11:10:02+00:00 https://securityintelligence.com/cybersecurity-skills-arent-just-for-security-professionals-anymore/ www.secnews.physaphae.fr/article.php?IdArticle=836475 False None None None Security Intelligence - Site de news Américain Why Healthcare Cyberattacks Should Be a Concern for Consumer Data Collectors Personal health information is extremely valuable to threat actors, and companies that store customers' health data need to be wary of healthcare cyberattacks that could threaten their business. ]]> 2018-10-05T13:25:02+00:00 https://securityintelligence.com/why-healthcare-cyberattacks-should-be-a-concern-for-consumer-data-collectors/ www.secnews.physaphae.fr/article.php?IdArticle=831773 False Threat None None Security Intelligence - Site de news Américain Signing Up for Benefits? Beware of Phishing Attacks Over the next two months, companies should educate and test their employees to prepare for the rise in phishing attacks related to benefits enrollment and holiday party and charity campaign planning. ]]> 2018-10-05T10:00:01+00:00 https://securityintelligence.com/signing-up-for-benefits-beware-of-phishing-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=831424 False None None None Security Intelligence - Site de news Américain The Inconvenient Truth About Your Eight-Character Password Your eight-character password is not as secure as you might think, but there are several simple actions you can take to truly strengthen your password security. ]]> 2018-10-04T13:25:02+00:00 https://securityintelligence.com/the-inconvenient-truth-about-your-eight-character-password/ www.secnews.physaphae.fr/article.php?IdArticle=830733 False None None None Security Intelligence - Site de news Américain As IoT Security Concerns Rise, Are Solutions Keeping Up? This year, IoT security jumped in importance for many security professionals as enterprises continue to adopt more IoT technologies. Now, our security tools and solutions need to catch up. ]]> 2018-10-04T12:30:02+00:00 https://securityintelligence.com/as-iot-security-concerns-rise-are-solutions-keeping-up/ www.secnews.physaphae.fr/article.php?IdArticle=830734 False None None None Security Intelligence - Site de news Américain How Nick Bradley Made a Career of Pursuing Bad Guys, From the Military to X-Force IRIS X-Force IRIS Practice Lead Nick Bradley was on track for an illustrious career in the military police when a computer virus detoured his path towards protection of a different kind. ]]> 2018-10-04T12:20:02+00:00 https://securityintelligence.com/how-nick-bradley-made-a-career-of-pursuing-bad-guys-from-the-military-to-x-force-iris/ www.secnews.physaphae.fr/article.php?IdArticle=830735 False Guideline None 2.0000000000000000 Security Intelligence - Site de news Américain Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home As threat actors increasingly target IoT devices to spread malware and facilitate DDoS attacks, it's crucial to establish network security policies for your home IT just as you would at work. ]]> 2018-10-03T12:10:02+00:00 https://securityintelligence.com/bringing-it-all-back-home-why-you-should-apply-enterprise-network-security-policies-to-your-smart-home/ www.secnews.physaphae.fr/article.php?IdArticle=829851 False Malware,Threat None None Security Intelligence - Site de news Américain The Wild West of Data Risk Management in the Age of Cloud, Mobile and Digital Transformation In today's rapidly evolving security environment, it's imperative for organizations to establish a formal data risk management program that does more than just check the boxes. ]]> 2018-10-03T11:35:01+00:00 https://securityintelligence.com/the-wild-west-of-data-risk-management-in-the-age-of-cloud-mobile-and-digital-transformation/ www.secnews.physaphae.fr/article.php?IdArticle=829771 False None None None Security Intelligence - Site de news Américain Visibility and Control: A One-Two Punch for Securing iOS Devices in the Enterprise With many organizations now dependent on iOS devices, security leaders must balance productivity and security with the right endpoint management solution. ]]> 2018-10-03T10:00:02+00:00 https://securityintelligence.com/visibility-and-control-a-one-two-punch-for-securing-ios-devices-in-the-enterprise/ www.secnews.physaphae.fr/article.php?IdArticle=829611 False Guideline None None Security Intelligence - Site de news Américain The Vinyasa of Security: Why Continuous Improvement Is Essential for Any Cybersecurity Strategy Like the concept of vinyasa in yoga, continuous improvement is the key to establishing and maintaining an effective cybersecurity strategy. ]]> 2018-10-02T13:30:02+00:00 https://securityintelligence.com/the-vinyasa-of-security-why-continuous-improvement-is-essential-for-any-cybersecurity-strategy/ www.secnews.physaphae.fr/article.php?IdArticle=828351 False None None None Security Intelligence - Site de news Américain SMB Security Best Practices: Why Smaller Businesses Face Bigger Risks While massive data breaches typically hog all the cybersecurity headlines, SMB security is also at risk as cybercriminals go after easy targets with low IT budgets. ]]> 2018-10-02T11:30:02+00:00 https://securityintelligence.com/smb-security-best-practices-why-smaller-businesses-face-bigger-risks/ www.secnews.physaphae.fr/article.php?IdArticle=828147 False None None None Security Intelligence - Site de news Américain Don\'t Overlook Your Data Blind Spots: 5 Tips for Protecting Unstructured Data 2018-10-01T12:00:01+00:00 https://securityintelligence.com/dont-overlook-your-data-blind-spots-5-tips-for-protecting-unstructured-data/ www.secnews.physaphae.fr/article.php?IdArticle=826586 False None None 2.0000000000000000 Security Intelligence - Site de news Américain An Open Letter to Security Managers: Stop Trying to Do It All Security managers and IT teams today often try to tackle everything in-house, even though they don't always have the skills and resources to run an effective security program. ]]> 2018-10-01T11:45:01+00:00 https://securityintelligence.com/an-open-letter-to-security-managers-stop-trying-to-do-it-all/ www.secnews.physaphae.fr/article.php?IdArticle=826587 False None None 5.0000000000000000 Security Intelligence - Site de news Américain National Cyber Security Awareness Month: What\'s New for 2018? 2018-10-01T11:00:02+00:00 https://securityintelligence.com/national-cyber-security-awareness-month-whats-new-for-2018/ www.secnews.physaphae.fr/article.php?IdArticle=826453 False None None None Security Intelligence - Site de news Américain IDC Releases 2018 Vendor Assessment for Ruggedized and IoT Device Deployments As the most widely deployed IBM SaaS solution, MaaS360 brings a strong set of unified endpoint management (UEM) capabilities for ruggedized hardware and IoT device deployments. ]]> 2018-09-28T13:25:01+00:00 https://securityintelligence.com/idc-releases-2018-vendor-assessment-for-ruggedized-and-iot-device-deployments/ www.secnews.physaphae.fr/article.php?IdArticle=825996 False None None 2.0000000000000000 Security Intelligence - Site de news Américain How Shir Levin Uses Her Nose for News to Sniff Out Identity Fraud Shir Levin used to report on government and law, but her journalism career wasn't data-driven enough for her. She now uses her experience in news, psychology and statistics to fight identity fraud. ]]> 2018-09-28T12:05:01+00:00 https://securityintelligence.com/how-shir-levin-uses-her-nose-for-news-to-sniff-out-identity-fraud/ www.secnews.physaphae.fr/article.php?IdArticle=825997 False None None 5.0000000000000000 Security Intelligence - Site de news Américain How to Develop Next-Generation SOC Analysts, Part 1 SOC analysts don't always come with all the certifications and skills an organization needs to protect its data. How can security leaders develop these employees into passionate, dedicated analysts? ]]> 2018-09-28T11:55:01+00:00 https://securityintelligence.com/how-to-develop-next-generation-soc-analysts-part-1/ www.secnews.physaphae.fr/article.php?IdArticle=825998 False Guideline None None Security Intelligence - Site de news Américain IBM Named a Leader in \'The Forrester Wave: Identity Management And Governance, Q3 2018\' 2018-09-27T14:35:05+00:00 https://securityintelligence.com/ibm-named-a-leader-in-the-forrester-wave-identity-management-and-governance-q3-2018/ www.secnews.physaphae.fr/article.php?IdArticle=825999 False Guideline None None Security Intelligence - Site de news Américain Supporting the Shift to Passwordless Authentication With FIDO IBM is embracing FIDO authentication across its offerings as part of its effort to shift the industry toward a standardized approach to authentication and the eventual end of passwords. ]]> 2018-09-26T16:10:04+00:00 https://securityintelligence.com/supporting-the-shift-to-passwordless-authentication-with-fido/ www.secnews.physaphae.fr/article.php?IdArticle=825347 False None None None Security Intelligence - Site de news Américain Protect Your \'Matrix\' With Strong Privileged Access Management 2018-09-26T13:00:05+00:00 https://securityintelligence.com/protect-your-matrix-with-strong-privileged-access-management/ www.secnews.physaphae.fr/article.php?IdArticle=825047 False None None None Security Intelligence - Site de news Américain TRusted Anonymous Data Exchange (TRADE) Threat Intelligence Sharing With Blockchain A new threat intelligence sharing network allows companies to control both who has access to information and the quality of anonymous threat data they consume. ]]> 2018-09-26T12:31:01+00:00 https://securityintelligence.com/trusted-anonymous-data-exchange-trade-threat-intelligence-sharing-with-blockchain/ www.secnews.physaphae.fr/article.php?IdArticle=824912 False Threat None 4.0000000000000000 Security Intelligence - Site de news Américain Maximize the Power of Your Open Source Application Security Testing To secure products that use open source components, organizations must first take stock of how much of this code they are using in their products. ]]> 2018-09-26T11:25:04+00:00 https://securityintelligence.com/maximize-the-power-of-your-open-source-application-security-testing/ www.secnews.physaphae.fr/article.php?IdArticle=824783 False None None None Security Intelligence - Site de news Américain Your Web Applications Are More Vulnerable Than You Think A recent study from Positive Technologies shined a light on an attack vector that is often overlooked: the insecurity of web applications. ]]> 2018-09-25T12:25:04+00:00 https://securityintelligence.com/your-web-applications-are-more-vulnerable-than-you-think/ www.secnews.physaphae.fr/article.php?IdArticle=823510 False None None 5.0000000000000000 Security Intelligence - Site de news Américain Customer Focus Drives Leadership in SIEM, Security Analytics We've seen many changes in the SIEM and security analytics space over the last decade, but throughout that time, IBM QRadar has consistently innovated and led the market in addressing new threats. ]]> 2018-09-24T17:40:04+00:00 https://securityintelligence.com/customer-focus-drives-leadership-in-siem-security-analytics/ www.secnews.physaphae.fr/article.php?IdArticle=822551 False None None None Security Intelligence - Site de news Américain What Metrics Do You Need to Measure the Success of Your SOC? Your SOC collects mounds of data every day, but not all of it will contribute to a useful, relevant analysis of its performance. What metrics do you need to measure the success of your SOC? ]]> 2018-09-24T16:41:00+00:00 https://securityintelligence.com/what-metrics-do-you-need-to-measure-the-success-of-your-soc/ www.secnews.physaphae.fr/article.php?IdArticle=822372 False None None None Security Intelligence - Site de news Américain How Analytics Can Help You Better Understand Access Risks The increasing complexity of modern IAM makes it hard to understand your organization's access risks. Identity analytics can help by enhancing existing processes with a rich behavioral and event data. ]]> 2018-09-24T11:35:05+00:00 https://securityintelligence.com/how-analytics-can-help-you-better-understand-access-risks/ www.secnews.physaphae.fr/article.php?IdArticle=821936 False None None None Security Intelligence - Site de news Américain Following the Clues With DcyFS: A File System for Forensics Decoy File System's overlay layer is a forensic tool that helps security teams piece together what happens during a cyberattack and collect key evidence in the aftermath of a breach. ]]> 2018-09-24T08:05:04+00:00 https://securityintelligence.com/following-the-clues-with-dcyfs-a-file-system-for-forensics/ www.secnews.physaphae.fr/article.php?IdArticle=821760 False Tool None None Security Intelligence - Site de news Américain Understanding California\'s Consumer Privacy Act: The \'American GDPR\' 2018-09-21T15:30:04+00:00 https://securityintelligence.com/understanding-californias-consumer-privacy-act-the-american-gdpr/ www.secnews.physaphae.fr/article.php?IdArticle=819208 False None None None Security Intelligence - Site de news Américain How Can Companies Defend Against Adversarial Machine Learning Attacks in the Age of AI? Machine learning can strengthen your security posture, but it's not without its blind spots. What do adversarial machine learning attacks look like, and how can companies stop them? ]]> 2018-09-21T11:25:05+00:00 https://securityintelligence.com/how-can-companies-defend-against-adversarial-machine-learning-attacks-in-the-age-of-ai/ www.secnews.physaphae.fr/article.php?IdArticle=818873 False None None None Security Intelligence - Site de news Américain Where Do We Stand With Digital Identity Trust? Top 5 Findings From the ISMG Survey When it comes to digital identity trust, many organizations still struggle to strike the right balance between security and the customer experience. ]]> 2018-09-20T12:25:05+00:00 https://securityintelligence.com/where-do-we-stand-with-digital-identity-trust-top-5-findings-from-the-ismg-survey/ www.secnews.physaphae.fr/article.php?IdArticle=817393 False None None None Security Intelligence - Site de news Américain Ransomware 101: What Is Ransomware and How Can You Protect Your Business? What is ransomware? In short, it's malware that encrypts your data and demands a ransom fee for its supposed safe return. The best defense against this threat is to keep it off the network altogether. ]]> 2018-09-20T11:55:04+00:00 https://securityintelligence.com/ransomware-101-what-is-ransomware-and-how-can-you-protect-your-business/ www.secnews.physaphae.fr/article.php?IdArticle=817277 False Ransomware,Malware,Threat None None Security Intelligence - Site de news Américain When It Comes to Cloud Data Protection, Defend Your Information Like a Guard Dog When it comes to cloud data protection, it's not just credit card numbers that need protecting, it's also the data that represents a majority of your company's value: your intellectual property. ]]> 2018-09-19T14:30:04+00:00 https://securityintelligence.com/when-it-comes-to-cloud-data-protection-defend-your-information-like-a-guard-dog/ www.secnews.physaphae.fr/article.php?IdArticle=815611 False None None None Security Intelligence - Site de news Américain Why Your Security Policies Could Be Failing Your Business Over the past three decades in IT, a persistent problem lingers over even the most well-documented enterprise security policies: lackluster implementation. ]]> 2018-09-19T11:45:03+00:00 https://securityintelligence.com/why-your-security-policies-could-be-failing-your-business/ www.secnews.physaphae.fr/article.php?IdArticle=815361 False None None None Security Intelligence - Site de news Américain How to Drive ROI and Improve Endpoint Security With a Managed Security Services Provider As an IT managed service provider (MSP), you can help clients save money by providing a high-value endpoint security service that closes the visibility gap. ]]> 2018-09-19T11:40:03+00:00 https://securityintelligence.com/how-to-drive-roi-and-improve-endpoint-security-with-a-managed-security-services-provider/ www.secnews.physaphae.fr/article.php?IdArticle=815272 False None None None Security Intelligence - Site de news Américain How Do You Know if Your Privileged Accounts Are at Risk? Since the majority of data breaches involve privileged accounts, it's critical to keep those accounts as secure as possible. ]]> 2018-09-18T15:20:03+00:00 https://securityintelligence.com/how-do-you-know-if-your-privileged-accounts-are-at-risk/ www.secnews.physaphae.fr/article.php?IdArticle=814249 False None None 3.0000000000000000 Security Intelligence - Site de news Américain Know Your Enemy: The Art and Science of Cyberthreat Hunting By conducting regular and comprehensive cyberthreat hunting, organizations can stay one step ahead of malicious actors and soften the blow of a data breach. ]]> 2018-09-18T11:40:04+00:00 https://securityintelligence.com/know-your-enemy-the-art-and-science-of-cyberthreat-hunting/ www.secnews.physaphae.fr/article.php?IdArticle=813816 False None None None Security Intelligence - Site de news Américain Reconciling Trust With Security: A Closer Look at Cyber Deception With DcyFS Central to DcyFS's cyber deception capabilities is its ability to modulate subject trust through a hierarchical file system organization. ]]> 2018-09-17T12:20:04+00:00 https://securityintelligence.com/reconciling-trust-with-security-a-closer-look-at-cyber-deception-with-dcyfs/ www.secnews.physaphae.fr/article.php?IdArticle=812125 False None None None Security Intelligence - Site de news Américain The Road to Freedom: How a Strong Security Culture Can Enable Digital Transformation Cybersecurity, if regarded as a strategic business enabler rather than an obstacle, can become the path to a smoother, freer digital transformation. Rethinking your security culture is the first step. ]]> 2018-09-17T11:10:03+00:00 https://securityintelligence.com/the-road-to-freedom-how-a-strong-security-culture-can-enable-digital-transformation/ www.secnews.physaphae.fr/article.php?IdArticle=811927 False None None 4.0000000000000000 Security Intelligence - Site de news Américain The National Cyber Security Centre and IBM Security Join Forces to Improve Security Skills Organizations are struggling to hire enough people with the right security skills. Industry and government must work together to give more opportunities to potential cyber talent. ]]> 2018-09-17T11:05:03+00:00 https://securityintelligence.com/the-national-cyber-security-centre-and-ibm-security-join-forces-to-improve-security-skills/ www.secnews.physaphae.fr/article.php?IdArticle=811928 False None None 5.0000000000000000 Security Intelligence - Site de news Américain Don\'t Get Caught Off Base: Make Threat Intelligence a Security Imperative 2018-09-14T13:00:03+00:00 https://securityintelligence.com/dont-get-caught-off-base-make-threat-intelligence-a-security-imperative/ www.secnews.physaphae.fr/article.php?IdArticle=807718 False Threat None 3.0000000000000000 Security Intelligence - Site de news Américain Listen to the Music of Technology With Integration Engineer Tone Johnson As an integration engineer for IBM X-Force and a former music producer, Anthony "Tone" Johnson has learned to embrace his creative side when approaching technical challenges. ]]> 2018-09-14T11:40:03+00:00 https://securityintelligence.com/listen-to-the-music-of-technology-with-integration-engineer-tone-johnson/ www.secnews.physaphae.fr/article.php?IdArticle=807654 False None None None Security Intelligence - Site de news Américain It\'s Time to Adopt AI in Your Security Operations Center 2018-09-13T13:00:04+00:00 https://securityintelligence.com/its-time-to-adopt-ai-in-your-security-operations-center/ www.secnews.physaphae.fr/article.php?IdArticle=806161 False None None None Security Intelligence - Site de news Américain New Gartner Report Recommends a Vulnerability Management Process Based on Weaponization and Asset Value 2018-09-13T12:00:04+00:00 https://securityintelligence.com/new-gartner-report-recommends-a-vulnerability-management-process-based-on-weaponization-and-asset-value/ www.secnews.physaphae.fr/article.php?IdArticle=806020 False Vulnerability None None Security Intelligence - Site de news Américain 12 New iOS 12 Features That Promise to Enhance Enterprise Device Management Apple's upcoming iOS 12 release will introduce new features that promise to help security teams improve enterprise device management. ]]> 2018-09-13T11:15:03+00:00 https://securityintelligence.com/12-new-ios-12-features-that-promise-to-enhance-enterprise-device-management/ www.secnews.physaphae.fr/article.php?IdArticle=806021 False None None None Security Intelligence - Site de news Américain What Are the Risks and Rewards Associated With AI in Healthcare? While the use of AI in healthcare promises to improve visibility and implementation, there are serious risks associated with the emerging technology if misused by staff or abused by threat actors. ]]> 2018-09-12T13:00:03+00:00 https://securityintelligence.com/what-are-the-risks-and-rewards-associated-with-ai-in-healthcare/ www.secnews.physaphae.fr/article.php?IdArticle=804593 False Threat None None Security Intelligence - Site de news Américain A Beginner\'s Guide to Threat Hunting 2018-09-12T12:15:03+00:00 https://securityintelligence.com/a-beginners-guide-to-threat-hunting/ www.secnews.physaphae.fr/article.php?IdArticle=804594 False Threat None None Security Intelligence - Site de news Américain Here\'s Why Business Email Compromise Is Still Driving Executive Identity Theft 2018-09-12T12:05:03+00:00 https://securityintelligence.com/heres-why-business-email-compromise-is-still-driving-executive-identity-theft/ www.secnews.physaphae.fr/article.php?IdArticle=804595 False None None None Security Intelligence - Site de news Américain Legal AI: How Machine Learning is Aiding - and Concerning - Law Practitioners Law firms tasked with analyzing mounds of data can vastly improve their efficiency by using legal AI tools. ]]> 2018-09-11T17:45:03+00:00 https://securityintelligence.com/legal-ai-how-machine-learning-is-aiding-and-concerning-law-practitioners/ www.secnews.physaphae.fr/article.php?IdArticle=803471 False None None 5.0000000000000000 Security Intelligence - Site de news Américain How Can Media Companies Be More Confident in Their Cybersecurity Strategy and Policy? According to recent research, only 1 percent of media companies are very confident in their cybersecurity strategy and policy. ]]> 2018-09-11T13:00:03+00:00 https://securityintelligence.com/how-can-media-companies-be-more-confident-in-their-cybersecurity-strategy-and-policy/ www.secnews.physaphae.fr/article.php?IdArticle=803013 False None None 3.0000000000000000 Security Intelligence - Site de news Américain Inspecting the Inspectors: How to Get the Most Out of Managed Security Solutions The IT skills shortage has led many organizations to consider investing in a managed security service provider (MSSP). But how do you know which vendor is right for your business? ]]> 2018-09-11T11:25:02+00:00 https://securityintelligence.com/inspecting-the-inspectors-how-to-get-the-most-out-of-managed-security-solutions/ www.secnews.physaphae.fr/article.php?IdArticle=802932 False None None 2.0000000000000000 Security Intelligence - Site de news Américain Hidden in Plain Sight: File System Protection With Cyber Deception Decoy File Systems (DcyFS), a new file system approach recently unveiled in Paris, complement access control schemes and can help overcome many of the fundamental limitations of traditional ACLs. ]]> 2018-09-10T12:55:05+00:00 https://securityintelligence.com/hidden-in-plain-sight-file-system-protection-with-cyber-deception/ www.secnews.physaphae.fr/article.php?IdArticle=801521 False None None None Security Intelligence - Site de news Américain IBM X-Force Delves Into ExoBot\'s Leaked Source Code 2018-09-10T12:01:01+00:00 https://securityintelligence.com/ibm-x-force-delves-into-exobots-leaked-source-code/ www.secnews.physaphae.fr/article.php?IdArticle=801522 False None None None Security Intelligence - Site de news Américain Why We Need Women in Security and What We\'re Doing to Help 2018-09-10T11:20:03+00:00 https://securityintelligence.com/why-we-need-women-in-security-and-what-were-doing-to-help/ www.secnews.physaphae.fr/article.php?IdArticle=801433 False None None None Security Intelligence - Site de news Américain How Brad Olive Fights Fires With Security Awareness Brad Olive has been spreading security awareness since the dawn of the internet. Today he develops personalized learning road maps aimed at various roles and user types for IBM Security Academy. ]]> 2018-09-07T12:00:03+00:00 https://securityintelligence.com/how-brad-olive-fights-fires-with-security-awareness/ www.secnews.physaphae.fr/article.php?IdArticle=797265 False None None None Security Intelligence - Site de news Américain Not Your Grandfather\'s SIEM: 5 Signs That You Should Reconsider Your Current SIEM Deployment 2018-09-07T11:05:02+00:00 https://securityintelligence.com/not-your-grandfathers-siem-5-signs-that-you-should-reconsider-your-current-siem-deployment/ www.secnews.physaphae.fr/article.php?IdArticle=797149 False Threat None None Security Intelligence - Site de news Américain 4 New Smart Office Security Risks and How to Mitigate Them The smart office market is forecast to double by 2023. But while IoT devices promise to bring a bevy of benefits, they also introduce entirely new categories of cyber risk. ]]> 2018-09-06T11:45:02+00:00 https://securityintelligence.com/4-new-smart-office-security-risks-and-how-to-mitigate-them/ www.secnews.physaphae.fr/article.php?IdArticle=795090 False None None None Security Intelligence - Site de news Américain Making the Business Case for Managed IAM Solutions Identity and access management (IAM) solutions can deliver real business value - and managed IAM solutions can help make sure they continue delivering that value well into the future. ]]> 2018-09-06T11:10:03+00:00 https://securityintelligence.com/making-the-business-case-for-managed-iam-solutions/ www.secnews.physaphae.fr/article.php?IdArticle=795091 False None None None Security Intelligence - Site de news Américain Why You Shouldn\'t Overlook Personal Electronic Devices in Your Enterprise Network 2018-09-05T13:00:03+00:00 https://securityintelligence.com/why-you-shouldnt-overlook-personal-electronic-devices-in-your-enterprise-network/ www.secnews.physaphae.fr/article.php?IdArticle=793696 False None None None Security Intelligence - Site de news Américain Threat Actors Peddling Weaponized IQY Files Via Necurs Botnet Threat actors have taken a liking to IQY files, which are foreign to most users and appear benign to many spam filters. ]]> 2018-09-05T12:26:02+00:00 https://securityintelligence.com/threat-actors-peddling-weaponized-iqy-files-via-necurs-botnet/ www.secnews.physaphae.fr/article.php?IdArticle=793529 False Spam,Threat None None Security Intelligence - Site de news Américain X-Force IRIS Identifies FIN6 Activity on POS Networks IBM X-Force IRIS identified a cybergang known as FIN6 using the FrameworkPOS and GratefulPOS malware to harvest massive amounts of payment card data from point-of-sale (POS) systems. ]]> 2018-09-05T12:25:05+00:00 https://securityintelligence.com/x-force-iris-identifies-fin6-activity-on-pos-networks/ www.secnews.physaphae.fr/article.php?IdArticle=793530 False Malware None None Security Intelligence - Site de news Américain Checkmate: How to Win the Cybersecurity Game Some refer to information security as a war, but it's better to think of it as a game. To win the cybersecurity game, you need to immerse yourself, practice and retrain regularly. ]]> 2018-09-04T12:20:04+00:00 https://securityintelligence.com/checkmate-how-to-win-the-cybersecurity-game/ www.secnews.physaphae.fr/article.php?IdArticle=791945 False None None None Security Intelligence - Site de news Américain Less Is More: Why CISOs Should Consolidate Their Security Tools CISOs need a broad range of security tools to fulfill their growing list of responsibilities. The more they can consolidate these solutions, the easier they are to manage and monitor. ]]> 2018-09-04T11:55:03+00:00 https://securityintelligence.com/less-is-more-why-cisos-should-consolidate-their-security-tools/ www.secnews.physaphae.fr/article.php?IdArticle=791867 False None None None Security Intelligence - Site de news Américain CamuBot: New Financial Malware Targets Brazilian Banking Customers IBM X-Force researchers identified new financial malware, dubbed CamuBot, that attempts to camouflage itself as a security module required by the Brazilian banks it targets. ]]> 2018-09-04T10:00:05+00:00 https://securityintelligence.com/camubot-new-financial-malware-targets-brazilian-banking-customers/ www.secnews.physaphae.fr/article.php?IdArticle=791791 False Malware None None Security Intelligence - Site de news Américain How Matt Dobbs Solves the Cybersecurity Puzzle His time in the dot-com bubble set Matt Dobbs on the road to global cybersecurity. Today he ensures IBM Security's point products integrate seamlessly for client convenience and peace of mind. ]]> 2018-08-31T12:20:04+00:00 https://securityintelligence.com/how-matt-dobbs-solves-the-cybersecurity-puzzle/ www.secnews.physaphae.fr/article.php?IdArticle=787015 False None None None Security Intelligence - Site de news Américain \'All the Queen\'s Horses\': A Real-World Use Case for Managing Insider Threats 2018-08-31T12:00:03+00:00 https://securityintelligence.com/all-the-queens-horses-a-real-world-use-case-for-managing-insider-threats/ www.secnews.physaphae.fr/article.php?IdArticle=786927 False None None None Security Intelligence - Site de news Américain Why Your Organization Should Invest in Cybersecurity Insurance Despite the rising cost of a data breach, many organizations still believe they don't need cybersecurity insurance. ]]> 2018-08-30T11:00:03+00:00 https://securityintelligence.com/why-your-organization-should-invest-in-cybersecurity-insurance/ www.secnews.physaphae.fr/article.php?IdArticle=785796 False None None None Security Intelligence - Site de news Américain Cybersecurity Muscle Memory: Drilling for a Tight Incident Response It's not enough to follow a rough outline of your incident response strategy. Conduct regular, intensive, detailed exercises within a well-defined framework to establish cybersecurity muscle memory. ]]> 2018-08-29T12:45:05+00:00 https://securityintelligence.com/cybersecurity-muscle-memory-drilling-for-a-tight-incident-response/ www.secnews.physaphae.fr/article.php?IdArticle=784293 False None None None Security Intelligence - Site de news Américain It\'s Time for Cryptocurrency Security to Catch Up With Investor Expansion 2018-08-29T12:45:02+00:00 https://securityintelligence.com/its-time-for-cryptocurrency-security-to-catch-up-with-investor-expansion/ www.secnews.physaphae.fr/article.php?IdArticle=784294 False None None None Security Intelligence - Site de news Américain 3 Key Areas of Security Operations to Benchmark and Evaluate SOC leaders should benchmark against speed, intelligence and accuracy to effectively measure and, ultimately, improve their security operations workflow. ]]> 2018-08-28T11:55:04+00:00 https://securityintelligence.com/3-key-areas-of-security-operations-to-benchmark-and-evaluate/ www.secnews.physaphae.fr/article.php?IdArticle=782944 False Guideline None None Security Intelligence - Site de news Américain Getting Your Organization Up to Speed With SAP GRC There's a gowing disparity between IT professionals and the C-suite regarding SAP GRC concerns. Bridging this gap of understanding is the first step toward an effective compliance strategy. ]]> 2018-08-28T11:45:05+00:00 https://securityintelligence.com/getting-your-organization-up-to-speed-with-sap-grc/ www.secnews.physaphae.fr/article.php?IdArticle=782945 False None None None Security Intelligence - Site de news Américain Mobile Blockchain Ballot Trial Raises Voting Security Questions West Virginia launched a pilot program to enable members of the military to cast ballots for November's U.S. elections on their mobile devices, but some experts are concerned about voting security. ]]> 2018-08-27T13:41:00+00:00 https://securityintelligence.com/mobile-blockchain-ballot-trial-raises-voting-security-questions/ www.secnews.physaphae.fr/article.php?IdArticle=782946 False None None None Security Intelligence - Site de news Américain How Gaming Prepares Youth for Careers in Cybersecurity The time kids spend playing video games online may provide opportunities for learning cybersecurity basics. Experts believe the post-millennial generation could be primed for careers in cybersecurity. ]]> 2018-08-27T13:27:03+00:00 https://securityintelligence.com/how-gaming-prepares-youth-for-careers-in-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=782947 False None None None Security Intelligence - Site de news Américain Password Management Remains an Issue - What\'s Next? 2018-08-27T12:28:02+00:00 https://securityintelligence.com/password-management-remains-an-issue-whats-next/ www.secnews.physaphae.fr/article.php?IdArticle=782948 False None None 3.0000000000000000 Security Intelligence - Site de news Américain Security Gamification Engineer Richard Moore Proves That Anyone Can Be a Hacker Security gamification engineer Richard Moore designs cyberthreat scenarios to unlock the competitive spirit of cybersecurity professionals and demonstrate how easy it is for anyone to hack a system. ]]> 2018-08-24T11:45:03+00:00 https://securityintelligence.com/security-gamification-engineer-richard-moore-proves-that-anyone-can-be-a-hacker/ www.secnews.physaphae.fr/article.php?IdArticle=782949 False Hack None 3.0000000000000000 Security Intelligence - Site de news Américain Don\'t Risk It: Why You Shouldn\'t Assume All Cybersecurity Solutions Are Based on Standards 2018-08-24T11:34:01+00:00 https://securityintelligence.com/dont-risk-it-why-you-shouldnt-assume-all-cybersecurity-solutions-are-based-on-standards/ www.secnews.physaphae.fr/article.php?IdArticle=782950 False None None 2.0000000000000000 Security Intelligence - Site de news Américain Don\'t Wait for Regulations to Transform Cryptocurrency Securities 2018-08-23T15:25:01+00:00 https://securityintelligence.com/dont-wait-for-regulations-to-transform-cryptocurrency-securities/ www.secnews.physaphae.fr/article.php?IdArticle=782951 False None None 4.0000000000000000 Security Intelligence - Site de news Américain Why You Need Full Visibility to Manage Common Vulnerabilities and Exposures (CVE) The volume of CVE data is rapidly growing, and security teams need continuous visibility into their assets and associated risks to stay on top of emerging threats. ]]> 2018-08-23T12:02:03+00:00 https://securityintelligence.com/why-you-need-full-visibility-to-manage-common-vulnerabilities-and-exposures-cve/ www.secnews.physaphae.fr/article.php?IdArticle=782952 False None None 5.0000000000000000