www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-03T19:10:44+00:00 www.secnews.physaphae.fr Security Intelligence - Site de news Américain What\'s In a (Threat Intelligence) Name? 2018-08-22T15:15:02+00:00 https://securityintelligence.com/whats-in-a-threat-intelligence-name/ www.secnews.physaphae.fr/article.php?IdArticle=782953 False Threat None 3.0000000000000000 Security Intelligence - Site de news Américain Stories From the Edge of IoT Security: Threat Demos From Black Hat and DEF CON At Black Hat 2018 and DEF CON 26, experts shared insights about IoT security risks and vulnerabilities and offered advice to help organizations and consumers navigate our increasingly connected world. ]]> 2018-08-20T16:35:02+00:00 https://securityintelligence.com/stories-from-the-edge-of-iot-security-threat-demos-from-black-hat-and-def-con/ www.secnews.physaphae.fr/article.php?IdArticle=782438 False Threat None None Security Intelligence - Site de news Américain How to Leverage Log Services to Analyze C&C Traffic 2018-08-20T10:10:02+00:00 https://securityintelligence.com/how-to-leverage-log-services-to-analyze-cc-traffic/ www.secnews.physaphae.fr/article.php?IdArticle=781874 False Threat None None Security Intelligence - Site de news Américain Bring These Security Metrics to Your Next Budget Meeting With the Board By presenting the right security metrics to executives, CISOs can develop a strong business case for greater investment in cybersecurity. ]]> 2018-08-17T13:50:02+00:00 https://securityintelligence.com/bring-these-security-metrics-to-your-next-budget-meeting-with-the-board/ www.secnews.physaphae.fr/article.php?IdArticle=779757 False None None None Security Intelligence - Site de news Américain How to Protect Your Organization From Insider Threats Malicious actors outside your organization aren't always the only ones at fault for data breaches. Comprehensive employee security training is crucial to minimize the risk of insider threats. ]]> 2018-08-17T11:40:02+00:00 https://securityintelligence.com/how-to-protect-your-organization-from-insider-threats/ www.secnews.physaphae.fr/article.php?IdArticle=779758 False None None None Security Intelligence - Site de news Américain Email Security Best Practices to Help You Reel In the Threat of Phishing Phishing is still among the most common causes of a data breach. Companies should invest in managed security services and comprehensive awareness training to improve email security best practices. ]]> 2018-08-16T12:15:02+00:00 https://securityintelligence.com/email-security-best-practices-to-help-you-reel-in-the-threat-of-phishing/ www.secnews.physaphae.fr/article.php?IdArticle=779759 False Threat None None Security Intelligence - Site de news Américain Android 9 in the Enterprise: Easy as Pie With enhanced features for users' personal and professional lives alike, Android 9 Pie raises the bar yet again for Google's mobile OS offering. ]]> 2018-08-15T13:06:01+00:00 https://securityintelligence.com/android-9-in-the-enterprise-easy-as-pie/ www.secnews.physaphae.fr/article.php?IdArticle=779760 False None None None Security Intelligence - Site de news Américain Global Perspectives on Cyber Resilience From Marsh & McLennan\'s 2018 Cyber Handbook 2018-08-15T12:06:01+00:00 https://securityintelligence.com/global-perspectives-on-cyber-resilience-from-marsh-mclennans-2018-cyber-handbook/ www.secnews.physaphae.fr/article.php?IdArticle=779761 False None None None Security Intelligence - Site de news Américain How John Clarke Shifted Gears From Driving Vans to Gamifying Incident Response Ten years ago, John Clarke was driving a van in Ireland for a living. Today, he develops games at IBM to help train security professionals on incident response and cyber situational awareness. ]]> 2018-08-14T11:16:01+00:00 https://securityintelligence.com/how-john-clarke-shifted-gears-from-driving-vans-to-gamifying-incident-response/ www.secnews.physaphae.fr/article.php?IdArticle=779762 False None None None Security Intelligence - Site de news Américain How a Fascination With Machinery Led Irina Nicolae to AI Research As a young girl in Romania, Irina Nicolae was fascinated with machinery and how different parts fit together. Today, she conducts AI research to develop ways to protect this technology from threats. ]]> 2018-08-14T11:11:01+00:00 https://securityintelligence.com/how-a-fascination-with-machinery-led-irina-nicolae-to-ai-research/ www.secnews.physaphae.fr/article.php?IdArticle=779763 False None None None Security Intelligence - Site de news Américain How Mike Barcomb\'s Military Mindset Enhances Incident Response 2018-08-14T11:08:01+00:00 https://securityintelligence.com/how-mike-barcombs-military-mindset-enhances-incident-response/ www.secnews.physaphae.fr/article.php?IdArticle=779764 False Guideline None None Security Intelligence - Site de news Américain A Black Hat Veteran Reflects on the Hot Topics at This Year\'s Conference 2018-08-14T10:16:01+00:00 https://securityintelligence.com/a-black-hat-veteran-reflects-on-the-hot-topics-at-this-years-conference/ www.secnews.physaphae.fr/article.php?IdArticle=779765 False Vulnerability None None Security Intelligence - Site de news Américain How to Defend With the Courses of Action Matrix and Indicator Lifecycle Management The lifecycle management of indicators is an important element to support decisions and actions against attackers. This process informs the courses of action matrix to build a response plan. ]]> 2018-08-13T15:06:01+00:00 https://securityintelligence.com/how-to-defend-with-the-courses-of-action-matrix-and-indicator-lifecycle-management/ www.secnews.physaphae.fr/article.php?IdArticle=779766 False None None None Security Intelligence - Site de news Américain Know Your Enemy: How to Build a Successful Threat Hunting Program To build a successful threat hunting program, you must thoroughly understand who might attack your organization, what these malicious actors might be after and what tactics they'll use to get it. ]]> 2018-08-10T12:31:02+00:00 https://securityintelligence.com/know-your-enemy-how-to-build-a-successful-threat-hunting-program/ www.secnews.physaphae.fr/article.php?IdArticle=774973 False Threat None None Security Intelligence - Site de news Américain Identity Is the New Perimeter - But Where\'s Its Firewall? 2018-08-10T12:21:01+00:00 https://securityintelligence.com/identity-is-the-new-perimeter-but-wheres-its-firewall/ www.secnews.physaphae.fr/article.php?IdArticle=774974 False None None None Security Intelligence - Site de news Américain What Are the Seven Biggest Social Media Scams of 2018? Social media scams are an ever-evolving way for criminals to abuse the exponentially connected applications that are increasingly saturating users' everyday lives. ]]> 2018-08-09T15:26:01+00:00 https://securityintelligence.com/what-are-the-seven-biggest-social-media-scams-of-2018/ www.secnews.physaphae.fr/article.php?IdArticle=773401 False None None None Security Intelligence - Site de news Américain How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4 Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework. ]]> 2018-08-09T14:11:02+00:00 https://securityintelligence.com/how-a-cyberattack-framework-can-help-reduce-risk-at-all-levels-part-4/ www.secnews.physaphae.fr/article.php?IdArticle=773301 False None None None Security Intelligence - Site de news Américain How to Outsmart the Smart City Researchers from Threatcare and IBM X-Force Red joined forces to test several smart city devices, with the goal of investigating "supervillain-level" attacks. Here's what the teams found. ]]> 2018-08-09T10:01:01+00:00 https://securityintelligence.com/outsmarting-the-smart-city/ www.secnews.physaphae.fr/article.php?IdArticle=772861 False None None None Security Intelligence - Site de news Américain Become a JSON Formatter - and Kick Your Security Integrations Into Action Becoming a JSON formatter, and packing up your data in a new way, can reduce or eliminate the need for custom work and save your security team precious time. ]]> 2018-08-08T14:46:00+00:00 https://securityintelligence.com/become-a-json-formatter-and-kick-your-security-integrations-into-action/ www.secnews.physaphae.fr/article.php?IdArticle=771253 False None None None Security Intelligence - Site de news Américain IBM Veteran Training: Service Members Shine in Cyber Crisis Management Training As the cybersecurity industry is challenged with a growing skills gap, IBM and CASY are offering cybersecurity training for veterans through the Veterans Accelerator program. ]]> 2018-08-08T12:26:01+00:00 https://securityintelligence.com/ibm-veteran-training-service-members-shine-in-cyber-crisis-management-training/ www.secnews.physaphae.fr/article.php?IdArticle=771069 False None None None Security Intelligence - Site de news Américain DeepLocker: How AI Can Power a Stealthy New Breed of Malware DeepLocker has changed the game of malware evasion by taking a fundamentally different approach from any other current evasive and targeted malware. Here's what you need to know. ]]> 2018-08-08T10:01:01+00:00 https://securityintelligence.com/deeplocker-how-ai-can-power-a-stealthy-new-breed-of-malware/ www.secnews.physaphae.fr/article.php?IdArticle=770873 False Malware None 3.0000000000000000 Security Intelligence - Site de news Américain Why You Should Do Your Homework Before Investing in Enterprise Blockchains Organizations looking to invest in enterprise blockchains to unify and secure transactions and data records should do their homework before trusting a vendor with their most sensitive information. ]]> 2018-08-07T11:56:01+00:00 https://securityintelligence.com/why-you-should-do-your-homework-before-investing-in-enterprise-blockchains/ www.secnews.physaphae.fr/article.php?IdArticle=769445 False None None None Security Intelligence - Site de news Américain How to Manage App Security Amid Expanding Shadow IT Protecting endpoint-generated data is the name of the game in cybersecurity today. However, increasing shares of shadow IT devices in the workplace are making app security a more significant challenge. ]]> 2018-08-07T11:41:01+00:00 https://securityintelligence.com/how-to-manage-app-security-amid-expanding-shadow-it/ www.secnews.physaphae.fr/article.php?IdArticle=769446 False None None None Security Intelligence - Site de news Américain 7 Ways to Identify Darknet Cybersecurity Risks Explore seven characteristics of security risk from the dark and hidden web. Learn how organizations can capture the latent value of dark-sourced threat intelligence. ]]> 2018-08-06T07:46:00+00:00 https://securityintelligence.com/7-ways-to-identify-darknet-cybersecurity-risks/ www.secnews.physaphae.fr/article.php?IdArticle=767632 False Threat None None Security Intelligence - Site de news Américain 5 Ways Privacy by Design Can Rebuild Consumer Trust As enterprises adopt GDPR requirements of privacy by design and default, there's an opportunity to win customer trust and build meaningful relationships through customer education around data privacy. ]]> 2018-08-03T15:41:00+00:00 https://securityintelligence.com/5-ways-privacy-by-design-can-rebuild-consumer-trust/ www.secnews.physaphae.fr/article.php?IdArticle=765276 False None None None Security Intelligence - Site de news Américain How to Maximize Your Cybersecurity Investment To determine the most effective cybersecurity investment for your organization, it's essential to follow a road map that skirts risks and assesses potential threats. ]]> 2018-08-02T12:36:01+00:00 https://securityintelligence.com/how-to-maximize-your-cybersecurity-investment/ www.secnews.physaphae.fr/article.php?IdArticle=763493 False None None None Security Intelligence - Site de news Américain How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3 An attacker who gains access won't necessarily walk away with an organization's proprietary data. Here's how a cyberattack framework can help you subvert an attacker already in a network. ]]> 2018-08-01T12:16:02+00:00 https://securityintelligence.com/how-a-cyberattack-framework-can-help-reduce-risk-at-all-levels-part-3/ www.secnews.physaphae.fr/article.php?IdArticle=761730 False None None None Security Intelligence - Site de news Américain How Self-Assessment Can Help You Avoid a Data Breach Your business can avoid a data breach by using self-assessment tools to plan your cybersecurity approach. Doing so empowers you to focus on making the headlines with good news. Here's how. ]]> 2018-08-01T11:03:04+00:00 https://securityintelligence.com/how-self-assessment-can-help-you-avoid-a-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=761666 False Data Breach None None Security Intelligence - Site de news Américain 5 Ways to Improve Collaboration Among Security Professionals Security professionals are not sharing intelligence as effectively as threat actors. The community can build a safer digital future for everyone by adopting more collaborative strategies. ]]> 2018-08-01T10:41:02+00:00 https://securityintelligence.com/5-ways-to-improve-collaboration-among-security-professionals/ www.secnews.physaphae.fr/article.php?IdArticle=761594 False Threat None None Security Intelligence - Site de news Américain How to Become an Articulate Leader and CISO in Five Steps When a CISO is also an articulate leader, he or she can teach the company at large why cybersecurity is essential to business interests and motivate stronger coordination to achieve goals. ]]> 2018-07-31T16:16:00+00:00 https://securityintelligence.com/how-to-become-an-articulate-leader-and-ciso-in-five-steps/ www.secnews.physaphae.fr/article.php?IdArticle=760759 False Guideline None None Security Intelligence - Site de news Américain The State of Cybersecurity: A CISO and CTO Dish on AI, Emerging Threats, Crisis Leadership and More Sridhar Muppidi, CTO of cloud security and IAM at IBM Security, and Shamla Naidoo, global CISO at IBM, took time to discuss topics ranging from AI and blockchain to threat sharing and collaboration. ]]> 2018-07-31T11:41:00+00:00 https://securityintelligence.com/the-state-of-cybersecurity-a-ciso-and-cto-dish-on-ai-emerging-threats-crisis-leadership-and-more/ www.secnews.physaphae.fr/article.php?IdArticle=760286 False Threat None None Security Intelligence - Site de news Américain An AI Chatbot and Voice Assistant for the Mobile Employee IBM developed a new AI-enabled voice assistant to respond to common questions across email, corporate contacts and calendar using natural language processing (NLP) capabilities. ]]> 2018-07-30T15:31:00+00:00 https://securityintelligence.com/an-ai-chatbot-and-voice-assistant-for-the-mobile-employee/ www.secnews.physaphae.fr/article.php?IdArticle=759002 False None None None Security Intelligence - Site de news Américain How to Achieve Ransomware Recovery - Without Paying Ransom Ransomware recovery can be costly for companies with no defense strategy in place. Here's what your organization can do to protect itself from these ever-evolving threats. ]]> 2018-07-30T12:16:00+00:00 https://securityintelligence.com/how-to-achieve-ransomware-recovery-without-paying-ransom/ www.secnews.physaphae.fr/article.php?IdArticle=758760 False Ransomware None None Security Intelligence - Site de news Américain How to Get the Most Out of DEF CON and Black Hat 2018 The IBM X-Force Red team is well-represented at DEF CON and Black Hat 2018, hosting sessions and panels about smart city security, vulnerability management and more. ]]> 2018-07-30T10:31:00+00:00 https://securityintelligence.com/how-to-get-the-most-out-of-def-con-and-black-hat-2018/ www.secnews.physaphae.fr/article.php?IdArticle=758499 False Vulnerability None None Security Intelligence - Site de news Américain Bridging the Divided Perspectives on SOC Tech and Talent There's a significant divide between perceptions of SOC technology, talent and other key operations issues among analysts, directors and executives, according to the findings of a recent report. ]]> 2018-07-27T12:35:05+00:00 https://securityintelligence.com/bridging-the-divided-perspectives-on-soc-tech-and-talent/ www.secnews.physaphae.fr/article.php?IdArticle=756676 False None None None Security Intelligence - Site de news Américain Managing Enterprise Security Risk on Vacation Enterprise data and devices require additional safeguarding wherever your employee takes them - especially on vacation. Some basic user education can greatly reduce security risk. ]]> 2018-07-27T12:00:05+00:00 https://securityintelligence.com/managing-enterprise-security-risk-on-vacation/ www.secnews.physaphae.fr/article.php?IdArticle=756574 False None None None Security Intelligence - Site de news Américain Incident Response Under GDPR: What to Do Before, During and After a Data Breach With GDPR in full swing, organizations need to prepare their incident response plans to move swiftly in the event of a breach and meet the mandated 72-hour incident disclosure window. ]]> 2018-07-27T11:35:05+00:00 https://securityintelligence.com/incident-response-under-gdpr-what-to-do-before-during-and-after-a-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=756575 False Data Breach None None Security Intelligence - Site de news Américain Gartner Releases First-Ever Magic Quadrant for Unified Endpoint Management (UEM) IBM was named a leader in the 2018 Magic Quadrant for Unified Endpoint Management Tools report for its completeness of vision and ability to execute. ]]> 2018-07-26T14:25:05+00:00 https://securityintelligence.com/gartner-releases-first-ever-magic-quadrant-for-unified-endpoint-management-uem/ www.secnews.physaphae.fr/article.php?IdArticle=754812 True Guideline None None Security Intelligence - Site de news Américain Four Steps to Close the Window on Critical Vulnerabilities Critical vulnerabilities often remain unaddressed when an organization is unwilling to allocate resources to routinely update applications. Take steps now to secure your network against exploitation. ]]> 2018-07-26T12:15:05+00:00 https://securityintelligence.com/four-steps-to-close-the-window-on-critical-vulnerabilities/ www.secnews.physaphae.fr/article.php?IdArticle=754593 False None None None Security Intelligence - Site de news Américain How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2 In the external reconnaissance and launch attack phases of the X-Force IRIS cyberattack preparation framework, threat actors look for vulnerabilities and tailor their attacks to exploit them. ]]> 2018-07-25T12:16:00+00:00 https://securityintelligence.com/how-a-cyberattack-framework-can-help-reduce-risk-at-all-levels-part-2/ www.secnews.physaphae.fr/article.php?IdArticle=752903 False Threat None None Security Intelligence - Site de news Américain 10 Key Findings From the Ponemon Institute Value of Artificial Intelligence in Cybersecurity Study According to a new study conducted by the Ponemon Institute and sponsored by IBM, organizations could save an average of $2.5 million in operating costs by deploying artificial intelligence (AI). ]]> 2018-07-25T11:55:00+00:00 https://securityintelligence.com/10-key-findings-from-the-ponemon-institute-value-of-artificial-intelligence-in-cybersecurity-study/ www.secnews.physaphae.fr/article.php?IdArticle=754595 False None None None Security Intelligence - Site de news Américain Here\'s How the University of Bari Is Tackling the Cybersecurity Skills Shortage 2018-07-25T11:40:05+00:00 https://securityintelligence.com/heres-how-the-university-of-bari-is-tackling-the-cybersecurity-skills-shortage/ www.secnews.physaphae.fr/article.php?IdArticle=752858 False None None None Security Intelligence - Site de news Américain Quantum Leaps and Bounds: Why Quantum Computing Will Have a Positive Impact on Cybersecurity Despite the risks quantum computing might pose to organizations, this emerging technology also promises to enhance cybersecurity capabilities such as SIEM, incident response and data protection. ]]> 2018-07-24T14:21:01+00:00 https://securityintelligence.com/quantum-leaps-and-bounds-why-quantum-computing-will-have-a-positive-impact-on-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=751282 False None None None Security Intelligence - Site de news Américain How Open Source Intelligence Could Save Your Network Open source intelligence enables analysts to identify threats and uncover details about attacker behavior to improve their decision-making around incident response. ]]> 2018-07-24T11:00:05+00:00 https://securityintelligence.com/how-open-source-intelligence-could-save-your-network/ www.secnews.physaphae.fr/article.php?IdArticle=750936 False None None None Security Intelligence - Site de news Américain BYOD: Are Thousands of Rogue Devices Lurking on Your Network? While securing the variety of known devices on your network is hard work, it may feel impossible to manage uninvited guests. Here's how to effectively manage rogue devices. ]]> 2018-07-24T10:20:05+00:00 https://securityintelligence.com/byod-are-thousands-of-rogue-devices-lurking-on-your-network/ www.secnews.physaphae.fr/article.php?IdArticle=750937 False None None None Security Intelligence - Site de news Américain How Pivoting Can Help Your Incident Response Process Indicators of compromise are key data points used during an incident response process. Regularly testing the reliability of your indicators can make all the difference in your IT security process. ]]> 2018-07-23T11:15:05+00:00 https://securityintelligence.com/how-pivoting-can-help-your-incident-response-process/ www.secnews.physaphae.fr/article.php?IdArticle=749221 False None None None Security Intelligence - Site de news Américain Six Tips for Recruiting and Retaining Women in Security Roles As the number of unfilled cybersecurity positions increases, women in security remain grossly underrepresented. New data shows the deep-seated changes that must be made to turn these trends around. ]]> 2018-07-20T11:50:05+00:00 https://securityintelligence.com/six-tips-for-recruiting-and-retaining-women-in-security-roles/ www.secnews.physaphae.fr/article.php?IdArticle=747681 False None None None Security Intelligence - Site de news Américain New NIST Guidebook Says Cybersecurity Is Everyone\'s Job - Here\'s Why 2018-07-20T11:30:05+00:00 https://securityintelligence.com/new-nist-guidebook-says-cybersecurity-is-everyones-job-heres-why/ www.secnews.physaphae.fr/article.php?IdArticle=747682 False None None None Security Intelligence - Site de news Américain Why the Best Defense Is a Good Offensive Security Strategy Offensive security activities like cyberattack simulations, penetration testing and vulnerability assessments can help companies identify and remediate flaws before cybercriminals can exploit them. ]]> 2018-07-19T11:15:05+00:00 https://securityintelligence.com/why-the-best-defense-is-a-good-offensive-security-strategy/ www.secnews.physaphae.fr/article.php?IdArticle=747683 False Vulnerability None None Security Intelligence - Site de news Américain How Will Healthcare Cybersecurity Issues Impact Acquisitions? Healthcare cybersecurity is now the primary concern during acquisitions in this expanding industry. Business owners can take proactive steps to secure digital infrastructure before issues arise. ]]> 2018-07-19T10:50:05+00:00 https://securityintelligence.com/how-will-healthcare-cybersecurity-issues-impact-acquisitions/ www.secnews.physaphae.fr/article.php?IdArticle=747684 False None None None Security Intelligence - Site de news Américain How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1 The IBM X-Force IRIS cyberattack preparation and execution frameworks aim to help security teams predict threat actors' motives and tactics and communicate security intelligence more clearly. ]]> 2018-07-18T15:15:05+00:00 https://securityintelligence.com/how-the-ibm-x-force-iris-cyberattack-framework-helps-security-teams-reduce-risk-at-all-levels/ www.secnews.physaphae.fr/article.php?IdArticle=747685 False Threat None None Security Intelligence - Site de news Américain What\'s On the Horizon for SIEM Technology? Five Upcoming Innovations in Security Analytics 2018-07-18T11:12:01+00:00 https://securityintelligence.com/whats-on-the-horizon-for-siem-technology-five-upcoming-innovations-in-security-analytics/ www.secnews.physaphae.fr/article.php?IdArticle=747686 False Threat None None Security Intelligence - Site de news Américain Digital Strategy Isn\'t Meeting Security Needs - Here\'s What to Do 2018-07-18T11:05:04+00:00 https://securityintelligence.com/digital-strategy-isnt-meeting-security-needs-heres-what-to-do/ www.secnews.physaphae.fr/article.php?IdArticle=747687 False None None None Security Intelligence - Site de news Américain Key Questions for Effective Cyber Risk Management From the ISO 31000:2018 ISO 31000:2018 details best practices for managing organizational cyber risk. Explore some of the key questions to address when evaluating the efficacy of your risk-management process. ]]> 2018-07-17T12:20:05+00:00 https://securityintelligence.com/key-questions-for-effective-cyber-risk-management-from-the-iso-310002018/ www.secnews.physaphae.fr/article.php?IdArticle=747689 False None None None Security Intelligence - Site de news Américain Move Over, Ransomware: Why Cybercriminals Are Shifting Their Focus to Cryptojacking Instead of seeking financial gains with ransom demands, threat actors are now aiming to steal central processing unit (CPU) and graphics processing unit (GPU) resources to facilitate cryptojacking. ]]> 2018-07-17T11:45:05+00:00 https://securityintelligence.com/move-over-ransomware-why-cybercriminals-are-shifting-their-focus-to-cryptojacking/ www.secnews.physaphae.fr/article.php?IdArticle=747690 False Threat None None Security Intelligence - Site de news Américain Security Analysts Are Overworked, Understaffed and Overwhelmed - Here\'s How AI Can Help 2018-07-13T16:30:05+00:00 https://securityintelligence.com/security-analysts-are-overworked-understaffed-and-overwhelmed-heres-how-ai-can-help/ www.secnews.physaphae.fr/article.php?IdArticle=744174 False Threat None None Security Intelligence - Site de news Américain Think You\'ve Got Nothing to Hide? Think Again - Why Data Privacy Affects Us All 2018-07-13T13:25:05+00:00 https://securityintelligence.com/think-youve-got-nothing-to-hide-think-again-why-data-privacy-affects-us-all/ www.secnews.physaphae.fr/article.php?IdArticle=743922 False None None None Security Intelligence - Site de news Américain Understanding SIEM Technology: How to Add Value to Your Security Intelligence Implementation As the threat landscape expands - and IT skills grow increasingly scarce - many security leaders don't know how to get the most out of their security information and event management (SIEM) solution. ]]> 2018-07-12T12:25:04+00:00 https://securityintelligence.com/understanding-siem-technology-how-to-add-value-to-your-security-intelligence-implementation/ www.secnews.physaphae.fr/article.php?IdArticle=741744 False Threat,Guideline None None Security Intelligence - Site de news Américain Why It\'s Time to Cross Out the Checklist Approach to Vendor Security 2018-07-12T12:15:04+00:00 https://securityintelligence.com/why-its-time-to-cross-out-the-checklist-approach-to-vendor-security/ www.secnews.physaphae.fr/article.php?IdArticle=741745 False Vulnerability None None Security Intelligence - Site de news Américain Calculating the Cost of a Data Breach in 2018, the Age of AI and the IoT The 2018 Cost of a Data Breach Study from Ponemon Institute reveals that the total cost, per-capita cost and average size of a data breach have all increased year over year. ]]> 2018-07-11T12:00:05+00:00 https://securityintelligence.com/ponemon-cost-of-a-data-breach-2018/ www.secnews.physaphae.fr/article.php?IdArticle=740112 False Data Breach None None Security Intelligence - Site de news Américain The GDPR Evolution: A Letter to the CISO To keep GDPR compliance efforts on track, security leaders must collaborate across departments, invest in robust tools and services and adopt a risk-based approach to handling customer data. ]]> 2018-07-11T10:20:04+00:00 https://securityintelligence.com/the-gdpr-evolution-a-letter-to-the-ciso/ www.secnews.physaphae.fr/article.php?IdArticle=739973 False Guideline None None Security Intelligence - Site de news Américain Anubis Strikes Again: Mobile Malware Continues to Plague Users in Official App Stores IBM X-Force reported that mobile malware developers uploaded at least 10 malicious downloader apps to the Google Play Store as the first step in a process that fetches BankBot Anubis. ]]> 2018-07-10T11:20:01+00:00 https://securityintelligence.com/anubis-strikes-again-mobile-malware-continues-to-plague-users-in-official-app-stores/ www.secnews.physaphae.fr/article.php?IdArticle=738459 False Malware None None Security Intelligence - Site de news Américain Why Multifactor Authentication Is Crucial to Strengthen Mainframe Security By adopting a multifactor authentication (MFA) solution for mainframe security, organizations can protect their most sensitive assets from cybercriminals looking to exploit stolen credentials. ]]> 2018-07-09T12:05:04+00:00 https://securityintelligence.com/why-multifactor-authentication-is-crucial-to-strengthen-mainframe-security/ www.secnews.physaphae.fr/article.php?IdArticle=737172 False None None 5.0000000000000000 Security Intelligence - Site de news Américain How to Get Directors On Board With Cyber Risk Governance The latest report from the DCRO urged top leadership to become more engaged in cyber risk governance and to hold all departments - not just IT - accountable for proper security hygiene. ]]> 2018-07-09T11:30:04+00:00 https://securityintelligence.com/how-to-get-directors-on-board-with-cyber-risk-governance/ www.secnews.physaphae.fr/article.php?IdArticle=737091 False Guideline None None Security Intelligence - Site de news Américain A Brief History of iOS: The Evolution of MDM and Enterprise Mobility As the mobile threat landscape has expanded over the past decade, Apple's iOS releases have added new MDM features to help security professionals protect enterprise networks. ]]> 2018-07-09T11:20:04+00:00 https://securityintelligence.com/a-brief-history-of-ios-the-evolution-of-mdm-and-enterprise-mobility/ www.secnews.physaphae.fr/article.php?IdArticle=737092 False Threat None None Security Intelligence - Site de news Américain Generation Gap: Does Your Security Awareness Program Bridge the Divide? As more millennials enter the workforce, organizations should consider different approaches to security awareness training to account for generational knowledge gaps. ]]> 2018-07-06T13:25:04+00:00 https://securityintelligence.com/generation-gap-does-your-security-awareness-program-bridge-the-divide/ www.secnews.physaphae.fr/article.php?IdArticle=732946 False None None None Security Intelligence - Site de news Américain What\'s the Best Strategy to Manage Application Security Risk? 2018-07-06T13:25:04+00:00 https://securityintelligence.com/whats-the-best-strategy-to-manage-application-security-risk/ www.secnews.physaphae.fr/article.php?IdArticle=732945 False Threat,Guideline None None Security Intelligence - Site de news Américain 72 Hours: How a Data Breach Response Plan Can Help You Meet the GDPR Notification Deadline Without a data breach response plan, companies will find it difficult to disclose security incidents within 72 hours as required by the General Data Protection Regulation (GDPR). ]]> 2018-07-06T10:00:03+00:00 https://securityintelligence.com/72-hours-how-a-data-breach-response-plan-can-help-you-meet-the-gdpr-notification-deadline/ www.secnews.physaphae.fr/article.php?IdArticle=737095 False Data Breach None None Security Intelligence - Site de news Américain How Can We Make Smart Cities Even Smarter? Start With Security Intelligence Governments must embrace an immune system approach centered on security intelligence to stay ahead of advanced cyberthreats looking to breach the ever-widening perimeter of smart cities. ]]> 2018-07-05T11:20:04+00:00 https://securityintelligence.com/how-can-we-make-smart-cities-even-smarter-start-with-security-intelligence/ www.secnews.physaphae.fr/article.php?IdArticle=731295 False None None None Security Intelligence - Site de news Américain Why UEM Is the New MDM: The Latest Stage in Enterprise Evolution In addition to protecting laptops, smartphones, tablets and IoT devices, AI-powered UEM solutions can help security leaders manage apps, content, data and user identity and access more efficiently. ]]> 2018-07-03T12:05:03+00:00 https://securityintelligence.com/why-uem-is-the-new-mdm-the-latest-stage-in-enterprise-evolution/ www.secnews.physaphae.fr/article.php?IdArticle=731209 False Guideline None None Security Intelligence - Site de news Américain June\'s Cybersecurity Recap: The Evolving Cybersecurity Career Pathway 2018-07-03T11:20:03+00:00 https://securityintelligence.com/junes-cybersecurity-recap-the-evolving-cybersecurity-career-pathway/ www.secnews.physaphae.fr/article.php?IdArticle=731210 False None None 2.0000000000000000 Security Intelligence - Site de news Américain What Security Lessons Can Large Enterprises Learn From Small Businesses? Large enterprises can learn crucial security lessons from small and midsized organizations - which often have a stronger culture of accountability and responsibility when it comes to data protection. ]]> 2018-07-03T11:00:03+00:00 https://securityintelligence.com/what-security-lessons-can-large-enterprises-learn-from-small-businesses/ www.secnews.physaphae.fr/article.php?IdArticle=731211 False None None 3.0000000000000000 Security Intelligence - Site de news Américain Behind the Scenes of the Science Channel Special, \'Dark Web: Fighting Cybercrime\' 2018-07-02T15:15:04+00:00 https://securityintelligence.com/behind-the-scenes-of-the-science-channel-special-dark-web-fighting-cybercrime/ www.secnews.physaphae.fr/article.php?IdArticle=731212 False None None 2.0000000000000000 Security Intelligence - Site de news Américain What\'s Holding Back GDPR Compliance Efforts? 2018-07-02T15:10:03+00:00 https://securityintelligence.com/whats-holding-back-gdpr-compliance-efforts/ www.secnews.physaphae.fr/article.php?IdArticle=731213 False None None None Security Intelligence - Site de news Américain It\'s Time to Take Advantage of Multifactor Authentication for Mainframe Security 2018-07-02T15:03:00+00:00 https://securityintelligence.com/its-time-to-take-advantage-of-multifactor-authentication-for-mainframe-security/ www.secnews.physaphae.fr/article.php?IdArticle=731214 False Threat None None Security Intelligence - Site de news Américain Hiring IT Professionals? Here\'s Why Your Recruitment Process Is All Wrong 2018-06-29T12:00:03+00:00 https://securityintelligence.com/hiring-it-professionals-heres-why-your-recruitment-process-is-all-wrong/ www.secnews.physaphae.fr/article.php?IdArticle=728544 False None None None Security Intelligence - Site de news Américain The Cybercrime Landscape Is Evolving - Will Your Mobile Threat Defense Strategy Keep Up? As the workforce embraces mobility to increase productivity, organizations must adopt a more innovative, dynamic approach to mobile threat defense. ]]> 2018-06-29T10:55:03+00:00 https://securityintelligence.com/the-cybercrime-landscape-is-evolving-will-your-mobile-threat-defense-strategy-keep-up/ www.secnews.physaphae.fr/article.php?IdArticle=728476 False Threat None None Security Intelligence - Site de news Américain Goal! Spam Campaigns Capitalize on the World Cup Craze IBM X-Force researchers observed several ongoing spam campaigns tied to the World Cup - many of which used the official branding of tournament sponsors to lure victims. ]]> 2018-06-28T13:15:05+00:00 https://securityintelligence.com/goal-spam-campaigns-capitalize-on-the-world-cup-craze/ www.secnews.physaphae.fr/article.php?IdArticle=726915 False Spam None None Security Intelligence - Site de news Américain 4 Tips to Creatively Close the Information Security Skills Gap Hiring managers have lamented the so-called cybersecurity skills gap for many years, but some recruiters have found creative ways to solve this problem. ]]> 2018-06-28T11:45:03+00:00 https://securityintelligence.com/4-tips-to-creatively-close-the-information-security-skills-gap/ www.secnews.physaphae.fr/article.php?IdArticle=726739 False None None None Security Intelligence - Site de news Américain Eight Critical IDaaS Capabilities to Optimize Your IAM Strategy in the Cloud By investing in IDaaS capabilities, organizations can free themselves from the burdens of infrastructure support and specialized staffing required to operate common on-premises solutions. ]]> 2018-06-27T11:40:03+00:00 https://securityintelligence.com/eight-critical-idaas-capabilities-to-optimize-your-iam-strategy-in-the-cloud/ www.secnews.physaphae.fr/article.php?IdArticle=725355 False None None None Security Intelligence - Site de news Américain What Is Transparency\'s Role in Establishing Digital Trust With Consumers? 2018-06-27T11:25:03+00:00 https://securityintelligence.com/what-is-transparencys-role-in-establishing-digital-trust-with-consumers/ www.secnews.physaphae.fr/article.php?IdArticle=725356 False None None None Security Intelligence - Site de news Américain The Key to Protecting Your Crown Jewels? Improve Risk Management Experts at the 2018 RSA Conference demonstrated how increasing collaboration and accountability around cyber risk management is the best way to protect your critical assets. ]]> 2018-06-27T11:10:04+00:00 https://securityintelligence.com/the-key-to-protecting-your-crown-jewels-improve-risk-management/ www.secnews.physaphae.fr/article.php?IdArticle=725357 False None None None Security Intelligence - Site de news Américain Why Your Teen Should Develop Hacking Skills This Summer Hacking skills promote empathy, grit and creative problem solving - characteristics that can take teens far in their future careers, whether they pursue cybersecurity or any other field of study. ]]> 2018-06-26T13:00:03+00:00 https://securityintelligence.com/why-your-teen-should-develop-hacking-skills-this-summer/ www.secnews.physaphae.fr/article.php?IdArticle=723752 False None None 3.0000000000000000 Security Intelligence - Site de news Américain How to Deliver Frictionless Digital Trust With Pinpoint Accuracy Companies that lack the resources to establish digital trust seamlessly, via a frictionless online experience, risk incurring high abandonment rates and low net promoter scores (NPS). ]]> 2018-06-26T11:00:03+00:00 https://securityintelligence.com/why-online-channels-can-falter-without-digital-trust/ www.secnews.physaphae.fr/article.php?IdArticle=723574 False None None 4.0000000000000000 Security Intelligence - Site de news Américain IBM Named a Leader Again in the 2018 Gartner Magic Quadrant for Access Management, Worldwide For the second consecutive year, Gartner has named IBM a leader in its Magic Quadrant for Access Management, Worldwide report, validating its leadership in identity-as-a-service (IDaaS). ]]> 2018-06-25T18:30:03+00:00 https://securityintelligence.com/ibm-named-a-leader-again-in-the-2018-gartner-magic-quadrant-for-access-management-worldwide/ www.secnews.physaphae.fr/article.php?IdArticle=722537 True Guideline None None Security Intelligence - Site de news Américain It\'s Time to Infuse AI Into Your Endpoint Security Strategy 2018-06-25T16:50:02+00:00 https://securityintelligence.com/its-time-to-infuse-ai-into-your-endpoint-security-strategy/ www.secnews.physaphae.fr/article.php?IdArticle=722435 False Threat None None Security Intelligence - Site de news Américain Why Network Visibility Is Critical for Today\'s Compliance Mandates 2018-06-25T11:30:03+00:00 https://securityintelligence.com/why-network-visibility-is-critical-for-todays-compliance-mandates/ www.secnews.physaphae.fr/article.php?IdArticle=721857 False None None None Security Intelligence - Site de news Américain How to Prioritize Security Vulnerabilities in SecDevOps What's the first step toward prioritizing security vulnerabilities? Know which open source components developers use in their code and monitor them for alerts using SAST tools. ]]> 2018-06-25T11:05:03+00:00 https://securityintelligence.com/how-to-prioritize-security-vulnerabilities-in-secdevops/ www.secnews.physaphae.fr/article.php?IdArticle=721788 False None None None Security Intelligence - Site de news Américain Why Security Skills Should Be Taught, Not Hired To alleviate the cybersecurity hiring gap, CISOs should look to tap new pools of talent in adjacent industries and help new hires develop their security skills through thorough, regular training. ]]> 2018-06-22T11:45:02+00:00 https://securityintelligence.com/why-security-skills-should-be-taught-not-hired/ www.secnews.physaphae.fr/article.php?IdArticle=717164 False None None None Security Intelligence - Site de news Américain Fight Fire With Fire: How AI Plays a Role in Both Stopping and Committing DDoS Attacks When the machine learning technology cyber defenders use to stop DDoS attacks inevitably falls into the hands of malicious actors, which side will win? ]]> 2018-06-21T11:50:02+00:00 https://securityintelligence.com/fight-fire-with-fire-how-ai-plays-a-role-in-both-stopping-and-committing-ddos-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=715409 False None None None Security Intelligence - Site de news Américain Why Privileged Access Management Is Key to Preventing Insider Threats To protect their networks from insider threats, security teams need greater visibility into privileged accounts held by both employees and third-party vendors. ]]> 2018-06-20T12:05:02+00:00 https://securityintelligence.com/why-privileged-access-management-is-key-to-preventing-insider-threats/ www.secnews.physaphae.fr/article.php?IdArticle=713659 False None None None Security Intelligence - Site de news Américain How to Recognize a Business Email Compromise Attack Security leaders must implement phishing awareness programs to train employees to recognize business email compromise (BEC) attacks and other social engineering schemes that could compromise data. ]]> 2018-06-20T11:15:02+00:00 https://securityintelligence.com/how-to-recognize-a-business-email-compromise-attack/ www.secnews.physaphae.fr/article.php?IdArticle=713510 False Guideline None 5.0000000000000000 Security Intelligence - Site de news Américain How Can Security Leaders Maintain Control of Privileged Accounts? When users are granted inappropriate access to privileged accounts, they open the entire IT environment to vulnerabilities - and make it easier for malicious actors to infiltrate corporate networks. ]]> 2018-06-20T10:10:02+00:00 https://securityintelligence.com/how-can-security-leaders-maintain-control-of-privileged-accounts/ www.secnews.physaphae.fr/article.php?IdArticle=713661 False None None None Security Intelligence - Site de news Américain Why Community Is a Lifeline for Cybersecurity Experts Think about your day-to-day job as one of the many cybersecurity experts working in the industry today: What are your challenges? Learn how a community could be your lifeline. ]]> 2018-06-19T12:15:02+00:00 https://securityintelligence.com/why-community-is-a-lifeline-for-cybersecurity-experts/ www.secnews.physaphae.fr/article.php?IdArticle=712276 False None None None Security Intelligence - Site de news Américain Humans vs. Machines: Will Adversarial AI Become the Better Hacker? The advent of artificial intelligence (AI) brought with it a new set of attacks using adversarial AI. How can organizations fight an unknown enemy that's not even human? ]]> 2018-06-19T11:25:02+00:00 https://securityintelligence.com/humans-vs-machines-will-adversarial-ai-become-the-better-hacker/ www.secnews.physaphae.fr/article.php?IdArticle=712180 False None None None Security Intelligence - Site de news Américain How to Overcome Cognitive Biases That Threaten Data Security No one is immune to cognitive biases, but how can IT decision-makers ensure that logical flaws don't weaken data security? Learn how to overcome these security flaws that exist in our heads. ]]> 2018-06-19T11:10:02+00:00 https://securityintelligence.com/how-to-overcome-cognitive-biases-that-threaten-data-security/ www.secnews.physaphae.fr/article.php?IdArticle=712181 False None None None Security Intelligence - Site de news Américain Is Corporate VPN Security Dead? Corporate VPN security still plays a vital role in protecting enterprise networks, but it is no longer sufficient to prevent unauthorized third-party or privileged access on its own. ]]> 2018-06-18T12:15:02+00:00 https://securityintelligence.com/is-corporate-vpn-security-dead/ www.secnews.physaphae.fr/article.php?IdArticle=710329 False None None None Security Intelligence - Site de news Américain How Cloud Security Can Drive Innovation and Transform Your Business At the May 2018 IBM Security Summit in London, industry experts discussed how organizations could transform their business by developing a formal strategy for cloud security. ]]> 2018-06-18T10:30:02+00:00 https://securityintelligence.com/how-cloud-security-can-drive-innovation-and-transform-your-business/ www.secnews.physaphae.fr/article.php?IdArticle=710154 False None None 4.0000000000000000 Security Intelligence - Site de news Américain Is Your Healthcare Organization Prepared to Withstand a Data Security Breach? The most effective way to protect against a data security breach is to develop an immune system around an AI-powered core of security orchestration and analytics tools. ]]> 2018-06-15T14:50:04+00:00 https://securityintelligence.com/is-your-healthcare-organization-prepared-to-withstand-a-data-security-breach/ www.secnews.physaphae.fr/article.php?IdArticle=706327 False None None None Security Intelligence - Site de news Américain On the Hunt: Neutralize Malicious Actors With Proactive Threat Hunting Threat hunting enables security teams to shift from simply responding to attacks to proactively identifying and mitigating threats before they hit enterprise networks. ]]> 2018-06-15T02:45:02+00:00 https://securityintelligence.com/on-the-hunt-neutralize-malicious-actors-with-proactive-threat-hunting/ www.secnews.physaphae.fr/article.php?IdArticle=704833 False None None None