www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-04-29T17:04:24+00:00 www.secnews.physaphae.fr Security Intelligence - Site de news Américain Space Rogue: A Security Rebel Turned Pen Tester Two decades ago, Cris Thomas testified before Congress about various cybersecurity issues he uncovered as a white hat hacker. Today, he works as a penetration testing specialist for IBM X-Force Red. ]]> 2018-06-13T12:27:04+00:00 https://securityintelligence.com/space-rogue-a-security-rebel-turned-pen-tester/ www.secnews.physaphae.fr/article.php?IdArticle=703972 False None None None Security Intelligence - Site de news Américain A Proposed Solution to the Password Reuse Problem A group of researchers proposed a new framework that would enable web services to share users' password hash data in an effort to reduce password reuse. ]]> 2018-06-13T11:57:02+00:00 https://securityintelligence.com/a-proposed-solution-to-the-password-reuse-problem/ www.secnews.physaphae.fr/article.php?IdArticle=703973 False None None None Security Intelligence - Site de news Américain Four Ways IDaaS Can Help You Overcome Cloud Identity Hurdles An investment in IDaaS solutions can help organizations overcome common cloud identity challenges related to infrastructure support, specialized staffing, consistent deployments and maintenance. ]]> 2018-06-13T11:17:03+00:00 https://securityintelligence.com/four-ways-idaas-can-help-you-overcome-cloud-identity-hurdles/ www.secnews.physaphae.fr/article.php?IdArticle=703974 False None None None Security Intelligence - Site de news Américain GDPR: Time to Move Forward - and Keep It Going Now is the time for organizations to move forward with their GDPR readiness plans and ensure that compliance activities are embedded into their overall security strategy. ]]> 2018-06-12T14:37:03+00:00 https://securityintelligence.com/gdpr-time-to-move-forward-and-keep-it-going/ www.secnews.physaphae.fr/article.php?IdArticle=703975 False None None None Security Intelligence - Site de news Américain There\'s Never Been a Better Time to Consider Security Careers 2018-06-12T14:37:03+00:00 https://securityintelligence.com/theres-never-been-a-better-time-to-consider-security-careers/ www.secnews.physaphae.fr/article.php?IdArticle=703976 False None None None Security Intelligence - Site de news Américain Ransomware Recovery: Maintain Control of Your Data in the Face of an Attack Organizations can significantly reduce the risk and cost of ransomware recovery by investing in cloud data protection tools that feature file and object store encryption capabilities. ]]> 2018-06-12T12:12:03+00:00 https://securityintelligence.com/ransomware-recovery-maintain-control-of-your-data-in-the-face-of-an-attack/ www.secnews.physaphae.fr/article.php?IdArticle=703977 False None None None Security Intelligence - Site de news Américain Application Security Attacks: Will New NYDFS Regulation Protect NYC Financial Institutions? New regulation requires all financial institutions in New York City to conduct thorough risk assessments for application security and other IT issues and implement programs to address those risks. ]]> 2018-06-11T13:22:02+00:00 https://securityintelligence.com/application-security-attacks-will-new-nydfs-regulation-protect-nyc-financial-institutions/ www.secnews.physaphae.fr/article.php?IdArticle=703978 False None None None Security Intelligence - Site de news Américain How Will You Face the High Price of DDoS Attacks? The largest distributed denial-of-service (DDoS) attack that occurred in the spring of 2018 targeted GitHub and lasted more than eight minutes and measured 1.3 Tbps. How will you face such an attack? ]]> 2018-06-11T11:35:03+00:00 https://securityintelligence.com/how-will-you-face-the-high-price-of-ddos-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=703979 False None None None Security Intelligence - Site de news Américain Jump-Start Your Management of Known Vulnerabilities Known vulnerabilities are the weaknesses that are most often exploited, but how can they be managed? ]]> 2018-06-08T13:27:03+00:00 https://securityintelligence.com/jump-start-your-management-of-known-vulnerabilities/ www.secnews.physaphae.fr/article.php?IdArticle=700095 False None None None Security Intelligence - Site de news Américain A Step-By-Step Guide to Vulnerability Assessment Sometimes, security professionals don't know how to approach a vulnerability assessment, especially when it comes to dealing with results from its automated report. Here's how to get started. ]]> 2018-06-08T13:27:02+00:00 https://securityintelligence.com/a-step-by-step-guide-to-vulnerability-assessment/ www.secnews.physaphae.fr/article.php?IdArticle=700096 False None None None Security Intelligence - Site de news Américain Musings From a Coffee Bar: Threat Modeling Tips for Open Campus Security Chief information security officers (CISOs) shouldn't be afraid of an open campus. Threat modeling allows internal security teams to tailor security to areas that present the greatest security risk. ]]> 2018-06-07T14:20:02+00:00 https://securityintelligence.com/musings-from-a-coffee-bar-threat-modeling-tips-for-open-campus-security/ www.secnews.physaphae.fr/article.php?IdArticle=697553 False None None None Security Intelligence - Site de news Américain Incident Response and Digital Forensics: Will You Buy or Build? Companies generally have two options for incident response and digital forensics: Buy or build? Explore the fundamentals of both options, which could help you decide. ]]> 2018-06-06T13:18:00+00:00 https://securityintelligence.com/incident-response-and-digital-forensics-will-you-buy-or-build/ www.secnews.physaphae.fr/article.php?IdArticle=695267 False None None None Security Intelligence - Site de news Américain Cybersecurity at the World Cup: What You Should Know Global sporting events require heightened cybersecurity because of the expanded digitization of sports venues. ]]> 2018-06-06T13:18:00+00:00 https://securityintelligence.com/cybersecurity-at-the-world-cup-what-you-should-know/ www.secnews.physaphae.fr/article.php?IdArticle=695266 False None None None Security Intelligence - Site de news Américain Analyzing Your GDPR Readiness: The Core Data Protection Capabilities You Need The sweeping General Data Protection Regulation (GDPR) from the European Union (EU) intends to revolutionize the relationships of data holders or processors and the people associated with that data. ]]> 2018-06-05T13:02:03+00:00 https://securityintelligence.com/analyzing-your-gdpr-readiness-the-core-data-protection-capabilities-you-need/ www.secnews.physaphae.fr/article.php?IdArticle=693120 False None None 3.0000000000000000 Security Intelligence - Site de news Américain Open Source Tools for Active Defense Security If your goal is active defense, open source options may be particularly useful because these tools can help you demonstrate value and shore up support. ]]> 2018-06-05T12:07:02+00:00 https://securityintelligence.com/open-source-tools-for-active-defense-security/ www.secnews.physaphae.fr/article.php?IdArticle=692980 False None None None Security Intelligence - Site de news Américain Enterprise Cloud Security With 2020 Vision If you haven't already, you should consider a checkup on the health of your cloud security vision for 2020 and beyond. ]]> 2018-06-05T11:33:04+00:00 https://securityintelligence.com/enterprise-cloud-security-with-2020-vision/ www.secnews.physaphae.fr/article.php?IdArticle=692981 False None None None Security Intelligence - Site de news Américain Narrowing the Gaps in Unified Endpoint Management (UEM) Unified endpoint management (UEM) delivers on the promise of bringing a vast range of endpoints and enterprise use cases under one management console. ]]> 2018-06-04T13:02:02+00:00 https://securityintelligence.com/narrowing-the-gaps-in-unified-endpoint-management-uem/ www.secnews.physaphae.fr/article.php?IdArticle=691196 False None None 5.0000000000000000 Security Intelligence - Site de news Américain Establishing Digital Identity Assurance: Who Is in Your Circle of Digital Trust? 2018-06-04T12:02:02+00:00 https://securityintelligence.com/establishing-digital-identity-assurance-who-is-in-your-circle-of-digital-trust/ www.secnews.physaphae.fr/article.php?IdArticle=691112 False None None None Security Intelligence - Site de news Américain What Are the Different Types of Cyberthreat Intelligence? Building a cyberthreat intelligence program can be a daunting task. However, it's best to start small and grow continuously. ]]> 2018-06-04T11:57:02+00:00 https://securityintelligence.com/what-are-the-different-types-of-cyberthreat-intelligence/ www.secnews.physaphae.fr/article.php?IdArticle=691113 False None None None Security Intelligence - Site de news Américain Discover What Happened After a Security Incident - Without Losing Your Cool When a dreaded security incident or breach takes place, you'll face your true testing time. Here's how to discover what happened after a security incident - without losing your cool. ]]> 2018-06-01T11:33:04+00:00 https://securityintelligence.com/discover-what-happened-after-a-security-incident-without-losing-your-cool/ www.secnews.physaphae.fr/article.php?IdArticle=686655 False None None None Security Intelligence - Site de news Américain May\'s Cybersecurity Recap: Welcome to the GDPR Compliance Show 2018-06-01T11:02:03+00:00 https://securityintelligence.com/mays-cybersecurity-recap-welcome-to-the-gdpr-compliance-show/ www.secnews.physaphae.fr/article.php?IdArticle=686575 False None None None Security Intelligence - Site de news Américain Are Ransomware Attacks Rising or Falling? There are conflicting reports over whether or not ransomware attacks are growing. Many organizations state that it's the most popular malware form, but is this true? ]]> 2018-05-31T14:07:02+00:00 https://securityintelligence.com/are-ransomware-attacks-rising-or-falling/ www.secnews.physaphae.fr/article.php?IdArticle=684810 False None None None Security Intelligence - Site de news Américain GDPR Breach Notification: What Are the Requirements for Response? Last month I took part in a GDPR Summit panel where I spoke on the topic of breach notification. This blog shares the discussion points resulting from the debate. ]]> 2018-05-31T13:57:02+00:00 https://securityintelligence.com/gdpr-breach-notification-what-are-the-requirements-for-response/ www.secnews.physaphae.fr/article.php?IdArticle=684811 False None None None Security Intelligence - Site de news Américain The Hack React: Testing a SOC Director\'s Cybersecurity Incident Response 2018-05-30T13:40:00+00:00 https://securityintelligence.com/the-hack-react-testing-a-soc-directors-cybersecurity-incident-response/ www.secnews.physaphae.fr/article.php?IdArticle=682670 False None None None Security Intelligence - Site de news Américain The Inadvertent Insider Threat: A CISO Confronts a Breach From Within Human error, credential misuse and disgruntled employees aren't the most common threats security leaders have to face - but the complexities of these incidents make insider threats the stuff of CISO nightmares. ]]> 2018-05-30T13:39:02+00:00 https://securityintelligence.com/the-inadvertent-insider-threat-a-ciso-confronts-a-breach-from-within/ www.secnews.physaphae.fr/article.php?IdArticle=682671 False Guideline None None Security Intelligence - Site de news Américain The Compliance Crisis: A Compliance Officer Faces an Outdated Risk Management Framework Follow along with risk and compliance officer Frank Roth as he endeavors to fill in the gaps of an outdated (and incomplete) risk management framework in his new role at a utility company. ]]> 2018-05-30T13:37:05+00:00 https://securityintelligence.com/the-compliance-crisis-a-compliance-officer-faces-an-outdated-risk-management-framework/ www.secnews.physaphae.fr/article.php?IdArticle=682673 False None None 4.0000000000000000 Security Intelligence - Site de news Américain The Cloud Commotion: An IT Director\'s Road to Cloud Transformation 2018-05-30T13:36:03+00:00 https://securityintelligence.com/the-cloud-commotion-an-it-directors-road-to-cloud-transformation/ www.secnews.physaphae.fr/article.php?IdArticle=682674 False None None 2.0000000000000000 Security Intelligence - Site de news Américain The Modernization Misstep: A CEO Takes on Digital Transformation Step into the shoes of an insurance company CEO chasing digital transformation. Read on as she tries to avoid missteps in this story about modernization, risks, fraud and user experience. ]]> 2018-05-30T12:49:05+00:00 https://securityintelligence.com/the-modernization-misstep-a-ceo-takes-on-digital-transformation/ www.secnews.physaphae.fr/article.php?IdArticle=682675 False None None 3.0000000000000000 Security Intelligence - Site de news Américain New Banking Trojan MnuBot Discovered by IBM X Force Research IBM X-Force Research has uncovered a new Brazilian, Delphi-based malware active in the wild in a recent campaign dubbed MnuBot. ]]> 2018-05-29T13:03:00+00:00 https://securityintelligence.com/new-banking-trojan-mnubot-discovered-by-ibm-x-force-research/ www.secnews.physaphae.fr/article.php?IdArticle=680110 False None None 5.0000000000000000 Security Intelligence - Site de news Américain The 4 Critical Elements of an Incident Response Plan Many security analysts and consultant agree: It's time to get serious about incident response. Explore four critical elements of a solid plan. ]]> 2018-05-29T11:22:02+00:00 https://securityintelligence.com/the-4-critical-elements-of-an-incident-response-plan/ www.secnews.physaphae.fr/article.php?IdArticle=680004 False None None None Security Intelligence - Site de news Américain What Are the Legalities and Implications of \'Hacking Back\'? 2018-05-29T11:07:02+00:00 https://securityintelligence.com/what-are-the-legalities-and-implications-of-hacking-back/ www.secnews.physaphae.fr/article.php?IdArticle=679919 False None None None Security Intelligence - Site de news Américain The Security Data Scientist Is the Icing on the Cake Many organizations are hiring a security data scientist to support analysts and provide deep insights to the chief information security officer (CISO). ]]> 2018-05-25T15:32:03+00:00 https://securityintelligence.com/the-security-data-scientist-is-the-icing-on-the-cake/ www.secnews.physaphae.fr/article.php?IdArticle=672517 False None None None Security Intelligence - Site de news Américain What Are the Consequences of Neglecting User Security Training? Are your user security training efforts working? You may have never paused to think about the relationship your users have with your security program. ]]> 2018-05-25T11:42:02+00:00 https://securityintelligence.com/what-are-the-consequences-of-neglecting-user-security-training/ www.secnews.physaphae.fr/article.php?IdArticle=672071 False None None None Security Intelligence - Site de news Américain Lessons From the Cold War: Data Security Through Obscurity What can the Cold War teach us about data security? More than you may realize. Explore alternative methods for securing transmitting data. ]]> 2018-05-24T12:57:02+00:00 https://securityintelligence.com/lessons-from-the-cold-war-data-security-through-obscurity/ www.secnews.physaphae.fr/article.php?IdArticle=669701 False None None None Security Intelligence - Site de news Américain Mixed Reality Meets Its Full Potential Recent advancements have paved the way for the creation of a new, hybrid technology: mixed reality (MR). Developers are exploring how MR can add value to a variety of industries. ]]> 2018-05-24T11:12:02+00:00 https://securityintelligence.com/mixed-reality-meets-its-full-potential/ www.secnews.physaphae.fr/article.php?IdArticle=669418 False None None 3.0000000000000000 Security Intelligence - Site de news Américain Insider Threat Controls: What Are the GDPR Implications? To remain General Data Protection Regulation (GDPR) compliant, you will need to make sure the right people have the right access. Explore the implications of GDPR on insider threat controls. ]]> 2018-05-23T13:22:02+00:00 https://securityintelligence.com/insider-threat-controls-what-are-the-gdpr-implications/ www.secnews.physaphae.fr/article.php?IdArticle=667802 False None None None Security Intelligence - Site de news Américain IBM Named a Leader in the 2018 Gartner Magic Quadrant for Managed Security Services Last year was another significant and transformational period for IBM Security, as it was named a leader in the 2018 Gartner Magic Quadrant for Managed Security Services for the fifth year in a row. ]]> 2018-05-23T12:02:02+00:00 https://securityintelligence.com/ibm-named-a-leader-in-the-2018-gartner-magic-quadrant-for-managed-security-services/ www.secnews.physaphae.fr/article.php?IdArticle=667572 False Guideline None 2.0000000000000000 Security Intelligence - Site de news Américain Addressing the Massive Cybersecurity Skills Gap: Where Do We Begin? According to a recent report, there are an estimated 350,000 open cybersecurity jobs in the U.S. What are our options for addressing this massive gap? ]]> 2018-05-22T14:57:01+00:00 https://securityintelligence.com/addressing-the-massive-cybersecurity-skills-gap-where-do-we-begin/ www.secnews.physaphae.fr/article.php?IdArticle=666074 False None None 5.0000000000000000 Security Intelligence - Site de news Américain Will Two-Factor Authentication Ever Get Its Time in the Sun? Is two-factor authentification (2FA) already a thing of the past - or does it have a future? Explore some of the problems facing 2FA. ]]> 2018-05-22T08:32:01+00:00 https://securityintelligence.com/will-two-factor-authentication-ever-get-its-time-in-the-sun/ www.secnews.physaphae.fr/article.php?IdArticle=665425 False None None None Security Intelligence - Site de news Américain Critical Data: How Exposed Is Your Personal Information? Do you know who can see the critical data on your network? Learn how and why organizations may not be doing enough to protect sensitive information. ]]> 2018-05-22T08:22:02+00:00 https://securityintelligence.com/critical-data-how-exposed-is-your-personal-information/ www.secnews.physaphae.fr/article.php?IdArticle=665426 False None None None Security Intelligence - Site de news Américain Spotlight Your Data Within Shadow IT A managed cloud access security broker (CASB) can help organizations gain visibility into shadow IT by monitoring all data transferred between the cloud and on-premises infrastructure. ]]> 2018-05-21T13:07:05+00:00 https://securityintelligence.com/spotlight-your-data-within-shadow-it/ www.secnews.physaphae.fr/article.php?IdArticle=663660 False None None None Security Intelligence - Site de news Américain 4 Social Engineering Tricks That Fool Unsuspecting Employees Explore some of the most common social engineering tricks used to fool employees into handing over access to sensitive data. These include phishing, tailgating and social media pretexting. ]]> 2018-05-21T11:32:01+00:00 https://securityintelligence.com/4-social-engineering-tricks-that-fool-unsuspecting-employees/ www.secnews.physaphae.fr/article.php?IdArticle=663475 False None None None Security Intelligence - Site de news Américain How to Transform Data Into Actionable Threat Intelligence Threat intelligence should be translated into business-speak to help decision-makers understand the impact of potential threats and incorporate TI into their business strategies. ]]> 2018-05-21T11:02:02+00:00 https://securityintelligence.com/how-to-transform-data-into-actionable-threat-intelligence/ www.secnews.physaphae.fr/article.php?IdArticle=663476 False None None None Security Intelligence - Site de news Américain Ready to Try Threat Modeling? Avoid These 4 Common Missteps Avoid these common threat-modeling missteps. Threat modeling can help you identify and prioritize the risks to your organization - but if done incorrectly, it can leave you defenseless. ]]> 2018-05-18T10:02:01+00:00 https://securityintelligence.com/ready-to-try-threat-modeling-avoid-these-4-common-missteps/ www.secnews.physaphae.fr/article.php?IdArticle=657551 False None None None Security Intelligence - Site de news Américain Achieving More Effective Security With Collaborative Defense in Depth Collaborative defense connects an organization's people, processes and technology to deliver improved security through open integrations, threat intelligence sharing and digital transformation. ]]> 2018-05-17T14:52:01+00:00 https://securityintelligence.com/achieving-more-effective-security-with-collaborative-defense-in-depth/ www.secnews.physaphae.fr/article.php?IdArticle=655525 False None None None Security Intelligence - Site de news Américain What Does PwC\'s Annual Corporate Directors Survey Tell Us About Cyber Risks? 2018-05-17T13:27:00+00:00 https://securityintelligence.com/what-does-pwcs-annual-corporate-directors-survey-tell-us-about-cyber-risks/ www.secnews.physaphae.fr/article.php?IdArticle=655370 False None None 3.0000000000000000 Security Intelligence - Site de news Américain Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 2 With so much data being moved to the cloud, it's more crucial than ever for companies to deploy advanced firewalls, anomaly detection and other defense mechanisms to mitigate the risk of DDoS attacks. ]]> 2018-05-16T17:02:01+00:00 https://securityintelligence.com/bumper-to-bumper-detecting-and-mitigating-dos-and-ddos-attacks-on-the-cloud-part-2/ www.secnews.physaphae.fr/article.php?IdArticle=653510 False None None None Security Intelligence - Site de news Américain Achieving GDPR Compliance: The Spark That Will Light a Fire of Change A recent survey conducted by IBM Security and the IBM Institute for Business Value found that many organizations around the world are embracing GDPR compliance as an opportunity for innovation. ]]> 2018-05-16T11:42:01+00:00 https://securityintelligence.com/achieving-gdpr-compliance-the-spark-that-will-light-a-fire-of-change/ www.secnews.physaphae.fr/article.php?IdArticle=652825 False None None None Security Intelligence - Site de news Américain Achieving Cloud Security Through Gray Skies When it comes to cloud security challenges, the issue is one of complexity. Many organizations lack a centralized view of all workloads across all of their environments. ]]> 2018-05-16T11:17:01+00:00 https://securityintelligence.com/achieving-cloud-security-through-gray-skies/ www.secnews.physaphae.fr/article.php?IdArticle=652826 False None None None Security Intelligence - Site de news Américain 4 Essentials for Effective Security Awareness Training Awareness experts weigh in about the essential elements for an awareness program that keeps users engaged - and helps them identify major threats to an organization's security posture. ]]> 2018-05-15T13:52:02+00:00 https://securityintelligence.com/4-essentials-for-effective-security-awareness-training/ www.secnews.physaphae.fr/article.php?IdArticle=650834 False None None None Security Intelligence - Site de news Américain Best Practices for Designing a Security Operations Center Designing a security operations center (SOC) is not as simple as setting and forgetting an SIEM solution. Security leaders must consider human factors, business needs, budgetary constraints and more. ]]> 2018-05-15T12:07:01+00:00 https://securityintelligence.com/best-practices-for-designing-a-security-operations-center/ www.secnews.physaphae.fr/article.php?IdArticle=650580 False Guideline None None Security Intelligence - Site de news Américain What Is Next-Generation Privileged Account Management? Organizations need a privileged account management (PAM) solution that integrates seamlessly with the existing security environment - and helps security teams enforce least privilege policies. ]]> 2018-05-15T09:22:01+00:00 https://securityintelligence.com/what-is-next-generation-privileged-account-management/ www.secnews.physaphae.fr/article.php?IdArticle=650409 False None None None Security Intelligence - Site de news Américain Threat Intelligence Machine Learning Adoption: Time to Ditch the Black Box Security Analytics While studies reveal the majority of CTI adopters are dissatisfied with threat intelligence machine learning adoption, there's evidence the adversary is already using algorithms to their advantage. ]]> 2018-05-14T15:57:00+00:00 https://securityintelligence.com/threat-intelligence-machine-learning-adoption-time-to-ditch-the-black-box-security-analytics/ www.secnews.physaphae.fr/article.php?IdArticle=648310 False None None None Security Intelligence - Site de news Américain The Cherry on Top: Add Value to Existing Risk Management Activities With Open Source Tools Organizations with established risk management processes can drive efficiency and improve their overall risk posture by leveraging open source tools. ]]> 2018-05-14T11:52:01+00:00 https://securityintelligence.com/the-cherry-on-top-add-value-to-existing-risk-management-activities-with-open-source-tools/ www.secnews.physaphae.fr/article.php?IdArticle=647631 False None None None Security Intelligence - Site de news Américain Playing It Smart for Data Controllers and Processors Organizations preparing for GDPR should reach out to their third-party vendors to clearly define the roles, expectations and responsibilities of data controllers and processors. ]]> 2018-05-14T11:27:00+00:00 https://securityintelligence.com/playing-it-smart-for-data-controllers-and-processors/ www.secnews.physaphae.fr/article.php?IdArticle=647632 False None None None Security Intelligence - Site de news Américain Breaking Bad Behavior: Can AI Combat Insider Threats? Artificial intelligence (AI) tools enable security teams to identify behavioral patterns that could point to insider threats more quickly. ]]> 2018-05-11T13:17:00+00:00 https://securityintelligence.com/breaking-bad-behavior-can-ai-combat-insider-threats/ www.secnews.physaphae.fr/article.php?IdArticle=638131 False None None 2.0000000000000000 Security Intelligence - Site de news Américain Connect the Dots: IoT Security Risks in an Increasingly Connected World Although connected devices make our daily lives easier, IoT data, if not properly secured, can cause serious financial and reputational damage to companies deploying and manufacturing this technology. ]]> 2018-05-11T13:07:00+00:00 https://securityintelligence.com/connect-the-dots-iot-security-risks-in-an-increasingly-connected-world/ www.secnews.physaphae.fr/article.php?IdArticle=638132 False None None 5.0000000000000000 Security Intelligence - Site de news Américain What Matters Most During a Data Breach? How You React With the GDPR coming into effect on May 25, the cost of a data breach is about to skyrocket. A comprehensive, regularly updated CSIRP can help IR teams contain the damage associated with a breach. ]]> 2018-05-10T11:52:01+00:00 https://securityintelligence.com/what-matters-most-during-a-data-breach-how-you-react/ www.secnews.physaphae.fr/article.php?IdArticle=634906 False None None None Security Intelligence - Site de news Américain Cut Through the Fog: Improve Cloud Visibility to Identify Shadow IT Security teams need a single, scalable cloud solution that integrates seamlessly with a SIEM platform to identify shadow IT - and cut through the fog of cloud security. ]]> 2018-05-10T11:27:00+00:00 https://securityintelligence.com/cut-through-the-fog-improve-cloud-visibility-to-identify-shadow-it/ www.secnews.physaphae.fr/article.php?IdArticle=634907 False None None None Security Intelligence - Site de news Américain What Is the Current State of Cyber Resilience? Although new research revealed that the state of cyber resilience is improving - especially regarding executive engagement - there is still room for improvement. ]]> 2018-05-09T17:07:00+00:00 https://securityintelligence.com/what-is-the-current-state-of-cyber-resilience/ www.secnews.physaphae.fr/article.php?IdArticle=632583 False None None None Security Intelligence - Site de news Américain Risk Acceptance 101: What Happens When Security Needs Go Unfunded? The refusal of top leadership to fund security initiatives often translates to explicit, willful risk acceptance. ]]> 2018-05-09T12:22:01+00:00 https://securityintelligence.com/risk-acceptance-101-what-happens-when-security-needs-go-unfunded/ www.secnews.physaphae.fr/article.php?IdArticle=632434 False Guideline None 5.0000000000000000 Security Intelligence - Site de news Américain A Whole New Ballgame: Applying the Immune System Approach to Sporting Event Cybersecurity 2018-05-09T11:12:00+00:00 https://securityintelligence.com/a-whole-new-ballgame-applying-the-immune-system-approach-to-sporting-event-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=632435 False None None 3.0000000000000000 Security Intelligence - Site de news Américain WHOIS Behind Cyberattacks? Under GDPR, We May Not Know GDPR's implementation on an issue relevant to the cybersecurity industry may well have negative consequences that (ironically) run contrary to its original intent. ]]> 2018-05-08T14:00:04+00:00 https://securityintelligence.com/whois-behind-cyberattacks-under-gdpr-we-may-not-know/ www.secnews.physaphae.fr/article.php?IdArticle=632436 False None None 3.0000000000000000 Security Intelligence - Site de news Américain Mobile Financial Transactions Are Faster, But Are They Any Safer? The mobile revolution has made it simpler and faster for banking customers to conduct financial transactions, but it has also expanded the attack surface for fraudsters aiming to steal sensitive data. ]]> 2018-05-08T10:10:02+00:00 https://securityintelligence.com/mobile-financial-transactions-are-faster-but-are-they-any-safer/ www.secnews.physaphae.fr/article.php?IdArticle=632437 False None None 2.0000000000000000 Security Intelligence - Site de news Américain Reflecting on the Memcached Reflection Attacks: A Wake-Up Call for Developers The memcached vulnerability isn't new, but attackers exploited it in late February to launch what might be the largest DDoS attack on record. ]]> 2018-05-08T09:15:04+00:00 https://securityintelligence.com/reflecting-on-the-memcached-reflection-attacks-a-wake-up-call-for-developers/ www.secnews.physaphae.fr/article.php?IdArticle=632438 False None None 4.0000000000000000 Security Intelligence - Site de news Américain Why Collaborative Defense Is the Future of Endpoint Management To improve endpoint management in today's threat landscape, IT organizations must embrace collaborative defense by integrating tools into a cohesive security ecosystem and sharing threat intelligence. ]]> 2018-05-07T12:01:03+00:00 https://securityintelligence.com/why-collaborate-defense-is-the-future-of-endpoint-management/ www.secnews.physaphae.fr/article.php?IdArticle=632439 False None None None Security Intelligence - Site de news Américain If Video Killed the Radio, Will Malvertising Kill Your Website? Malvertising isn't just a nuisance for internet users - it puts businesses and their customers at risk and compromises the integrity of the online advertising ecosystem. ]]> 2018-05-07T10:41:01+00:00 https://securityintelligence.com/if-video-killed-the-radio-will-malvertising-kill-your-website/ www.secnews.physaphae.fr/article.php?IdArticle=632440 False None None None Security Intelligence - Site de news Américain Data Privacy Regulations: Ensuring Mobile Data Protection in Light of Increasing Regulations Organizations in every industry, from banking to retail, healthcare and more, are required to apply mobile data protection rules set by governments that impose massive fines in cases of noncompliance. Until the early 2000s, it was simpler to control data flows because information was mostly accessed from computers. Since then, companies have digitized their frameworks […] ]]> 2018-05-04T17:25:03+00:00 https://securityintelligence.com/data-privacy-regulations-ensuring-mobile-data-protection-in-light-of-increasing-regulations/ www.secnews.physaphae.fr/article.php?IdArticle=627172 False None None None Security Intelligence - Site de news Américain Class Is in Session: Improving Cybersecurity Awareness in the Education Sector The education industry faces a security crisis, one that goes beyond protecting the classrooms and hallways. IT professionals in the education sector see cybersecurity as their top priority, consistently ranking it as their No. 1 concern. However, more than three-quarters of employees in the education field lack the cybersecurity awareness required to handle common privacy […] ]]> 2018-05-04T17:20:03+00:00 https://securityintelligence.com/class-is-in-session-improving-cybersecurity-awareness-in-the-education-sector/ www.secnews.physaphae.fr/article.php?IdArticle=627173 False None None None Security Intelligence - Site de news Américain WannaCry Dominates Ransomware News in 2017, Drives 415 Percent Attack Boost WannaCry drove a 415 percent increase in ransomware attacks and accounted for 90 percent of all detection reports in 2017. In addition to these eye-popping numbers, F-Secure’s “The Changing State of Ransomware” report also offered some positive ransomware news: The lack of big paydays for campaigns such as WannaCry and NotPetya are now causing a […] ]]> 2018-05-04T17:13:01+00:00 https://securityintelligence.com/wannacry-dominates-ransomware-news-in-2017-drives-415-percent-attack-boost/ www.secnews.physaphae.fr/article.php?IdArticle=627174 False None NotPetya,Wannacry None Security Intelligence - Site de news Américain Debate Club: Comparing the Merits of Enterprise Mobility Management and Client Management Tools For IT and security leaders, the ability to manage devices, apps and content are critical to end-user productivity and the protection of corporate information. There are two popular methods for doing this across smartphones, tablets, laptops and servers. For mobile devices, the technology is most commonly referred to as enterprise mobility management (EMM). For laptops, […] ]]> 2018-05-03T18:43:00+00:00 https://securityintelligence.com/debate-club-comparing-the-merits-of-enterprise-mobility-management-and-client-management-tools/ www.secnews.physaphae.fr/article.php?IdArticle=625101 False Guideline None None Security Intelligence - Site de news Américain Why You Need New Mobile Security Best Practices for Business Travel In recent years, the risks associated with passing through an airport have changed dramatically. This demands a complete rethink about mobile security best practices for international travel. ]]> 2018-05-02T12:17:00+00:00 https://securityintelligence.com/why-you-need-new-mobile-security-best-practices-for-business-travel/ www.secnews.physaphae.fr/article.php?IdArticle=622493 False None None None Security Intelligence - Site de news Américain April\'s Cybersecurity Recap: More AI, More IoT and a Push for More Privacy 2018-05-02T11:42:00+00:00 https://securityintelligence.com/aprils-cybersecurity-recap-more-ai-more-iot-and-a-push-for-more-privacy/ www.secnews.physaphae.fr/article.php?IdArticle=622348 False None None None Security Intelligence - Site de news Américain Analyzing PDF and Office Documents Delivered Via Malspam Endpoint detection and antiphishing tools can help users filter basic spam email, but detecting malspam in PDF and Microsoft Office documents requires a more thorough investigation. ]]> 2018-05-01T12:51:05+00:00 https://securityintelligence.com/analyzing-pdf-and-office-documents-delivered-via-malspam/ www.secnews.physaphae.fr/article.php?IdArticle=620367 False None None None Security Intelligence - Site de news Américain Epic Fails in Data Security, Solutions Edition: Not Quantifying Your ROI One of the most common epic fails in data security is the failure to quantify the ROI of the enterprise's data protection solutions. ]]> 2018-05-01T11:32:00+00:00 https://securityintelligence.com/epic-fails-in-data-security-solutions-edition-not-quantifying-your-roi/ www.secnews.physaphae.fr/article.php?IdArticle=620255 False None None None Security Intelligence - Site de news Américain Simpler, Smarter Security With Intelligent Orchestration IBM's new Intelligent Orchestration offering enables analysts to streamline their investigations via integrations and incident response playbooks. ]]> 2018-05-01T11:11:05+00:00 https://securityintelligence.com/simpler-smarter-security-with-intelligent-orchestration/ www.secnews.physaphae.fr/article.php?IdArticle=620256 False None None None Security Intelligence - Site de news Américain When It Comes to Cyber Risks, Your Leadership Cannot Afford a Failure of Imagination A failure of imagination could cause business leaders fail to account for predictable cyber risks due to a misperception of the company's incident response capabilities and cyber resilience posture. ]]> 2018-04-30T11:46:05+00:00 https://securityintelligence.com/when-it-comes-to-cyber-risks-your-leadership-cannot-afford-a-failure-of-imagination/ www.secnews.physaphae.fr/article.php?IdArticle=619466 False Guideline None None Security Intelligence - Site de news Américain How to Build a Corporate Culture of Cyber Awareness The key to creating a culture of cyber awareness is to start small, set achievable goals and help employees understand how enterprise security affects their own privacy. ]]> 2018-04-30T11:06:05+00:00 https://securityintelligence.com/how-to-build-a-corporate-culture-of-cyber-awareness/ www.secnews.physaphae.fr/article.php?IdArticle=619467 False None None None Security Intelligence - Site de news Américain What Is the Way Ahead for Derivatives Clearing and Prime Services? Derivatives clearing and prime services providers face many new challenges, including intensifying regulatory requirements and legacy systems that can't keep up with evolving business models. ]]> 2018-04-27T12:01:05+00:00 https://securityintelligence.com/what-is-the-way-ahead-for-derivatives-clearing-and-prime-services/ www.secnews.physaphae.fr/article.php?IdArticle=617884 False None None None Security Intelligence - Site de news Américain Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 1 Cybercriminals use DoS and DDoS attacks to distrupt services and take down networks and applications by sending overwhelming volumes of malicious traffic to target systems. ]]> 2018-04-27T11:16:05+00:00 https://securityintelligence.com/bumper-to-bumper-detecting-and-mitigating-dos-and-ddos-attacks-on-the-cloud-part-1/ www.secnews.physaphae.fr/article.php?IdArticle=617885 False None None None Security Intelligence - Site de news Américain Insights From RSAC 2018: Taking the Human Element Out of Security At RSAC 2018, many speakers urged organizations to take the human element out of the security equation as much as possible by investing in automated tools and focusing on professional development. ]]> 2018-04-26T13:36:05+00:00 https://securityintelligence.com/insights-from-rsac-2018-taking-the-human-element-out-of-security/ www.secnews.physaphae.fr/article.php?IdArticle=615916 False None None None Security Intelligence - Site de news Américain Is End-to-End IoT Security Financially Feasible - or Even Possible? Organizations can build toward end-to-end IoT security by understanding the risks connected devices pose to their networks and analyzing how they interact with corporate data. ]]> 2018-04-26T11:46:05+00:00 https://securityintelligence.com/is-end-to-end-iot-security-financially-feasible-or-even-possible/ www.secnews.physaphae.fr/article.php?IdArticle=615716 False None None None Security Intelligence - Site de news Américain RSA Conference 2018 Recap: Building a Foundation for Tomorrow\'s Cybersecurity 2018-04-25T13:27:02+00:00 https://securityintelligence.com/rsa-conference-2018-recap-building-a-foundation-for-tomorrows-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=613640 False None None None Security Intelligence - Site de news Américain Protecting Your Employees\' Home IT From Cyberthreats 2018-04-25T12:01:05+00:00 https://securityintelligence.com/protecting-your-employees-home-it-from-cyberthreats/ www.secnews.physaphae.fr/article.php?IdArticle=613403 False Guideline None None Security Intelligence - Site de news Américain RSAC 2018 in Review: Highlights, Key Sessions and Emerging Industry Trends At RSAC 2018, countless security experts and practitioners gathered in San Francisco to talk about emerging threats and how the cybersecurity industry can prepare to meet evolving challenges. ]]> 2018-04-24T12:06:05+00:00 https://securityintelligence.com/rsac-2018-in-review-highlights-key-sessions-and-emerging-industry-trends/ www.secnews.physaphae.fr/article.php?IdArticle=611148 False None None None Security Intelligence - Site de news Américain Anti-I: The Future of AI-Generated Malware As AI progresses, security professionals must prepare for the inevitability of machines writing their own malware to infect other machines in the not-so-distant future. ]]> 2018-04-24T11:41:05+00:00 https://securityintelligence.com/anti-i-the-future-of-ai-generated-malware/ www.secnews.physaphae.fr/article.php?IdArticle=611149 False None None None Security Intelligence - Site de news Américain Asking the Right Questions: Key Takeaways From the CAQ\'s \'Cybersecurity Risk Management Oversight\' Guidance 2018-04-24T11:31:05+00:00 https://securityintelligence.com/asking-the-right-questions-key-takeaways-from-the-caqs-cybersecurity-risk-management-oversight-guidance/ www.secnews.physaphae.fr/article.php?IdArticle=611150 False None None None Security Intelligence - Site de news Américain Don\'t Be Held for Ransom: Five Strategies to Secure Healthcare Data Against Cyberattacks 2018-04-23T12:26:05+00:00 https://securityintelligence.com/dont-be-held-for-ransom-five-strategies-to-secure-healthcare-data-against-cyberattacks/ www.secnews.physaphae.fr/article.php?IdArticle=608522 False None None None Security Intelligence - Site de news Américain Blockchain Technology: Conflicting Perspectives on Enterprise Security From the RSA Conference 2018 2018-04-23T11:56:04+00:00 https://securityintelligence.com/blockchain-technology-conflicting-perspectives-on-enterprise-security-from-the-rsa-conference-2018/ www.secnews.physaphae.fr/article.php?IdArticle=608374 False None None None Security Intelligence - Site de news Américain How to Choose the Right Malware Classification Scheme to Improve Incident Response Analysts can improve and automate their incident response processes by adopting the right malware classification scheme according to specific threat management goals. ]]> 2018-04-23T11:06:05+00:00 https://securityintelligence.com/how-to-choose-the-right-malware-classification-scheme-to-improve-incident-response/ www.secnews.physaphae.fr/article.php?IdArticle=608375 False None None None Security Intelligence - Site de news Américain An Eagle Eye Over Network Security: Configuring Log Sources to Maximize SIEM Visibility To get the most out of an SIEM solution, analysts must properly configure their log sources to generate alerts when they stop reporting for certain periods of time, depending on their priority level. ]]> 2018-04-20T13:11:04+00:00 https://securityintelligence.com/an-eagle-eye-over-network-security-configuring-log-sources-to-maximize-siem-visibility/ www.secnews.physaphae.fr/article.php?IdArticle=599070 False None None None Security Intelligence - Site de news Américain Women in Security: Perspectives on Inclusion, Issues and Progress From the RSA Conference 2018 At the RSA Conference 2018, industry leaders gathered to discuss issues surrounding women in security, including the key role of female IT professionals in closing the cybersecurity skills gap. ]]> 2018-04-20T13:07:02+00:00 https://securityintelligence.com/women-in-security-perspectives-on-inclusion-issues-and-progress-from-the-rsa-conference-2018/ www.secnews.physaphae.fr/article.php?IdArticle=598898 False Guideline None None Security Intelligence - Site de news Américain As Cyber Risk Escalates, the C-Suite Must Take Action As long as C-suite executives believe that cybersecurity is an IT issue, they will remain disengaged from the solutions and their role in supporting a robust cyber risk management strategy. ]]> 2018-04-19T13:12:04+00:00 https://securityintelligence.com/as-cyber-risk-escalates-the-c-suite-must-take-action/ www.secnews.physaphae.fr/article.php?IdArticle=596478 False None None None Security Intelligence - Site de news Américain What to Do When a Memory Corruption on an Input String Generates a DoS When a special char in an application running on a common operating system generates a memory corruption issue, a holistic security immune system is the key to minimizing the impact of a DoS event. ]]> 2018-04-19T10:56:04+00:00 https://securityintelligence.com/what-to-do-when-a-memory-corruption-on-an-input-string-generates-a-dos/ www.secnews.physaphae.fr/article.php?IdArticle=596166 False None None None Security Intelligence - Site de news Américain Q1 2018 Results: Gozi (Ursnif) Takes Larger Piece of the Pie and Distributes IcedID Gozi took a larger slice of the financial malware pie and become the most active banking Trojan in 2017, according to the IBM X-Force Threat Intelligence Index 2018. ]]> 2018-04-18T12:26:04+00:00 https://securityintelligence.com/q1-2018-results-gozi-ursnif-takes-larger-piece-of-the-pie-and-distributes-icedid/ www.secnews.physaphae.fr/article.php?IdArticle=594437 False None None None Security Intelligence - Site de news Américain When Nobody Controls Your Object Stores - Except You Object stores are inexpensive and scalable, but how can you be sure your CSP will properly handle your encryption keys? How can you maintain the flexibility to switch CSPs if necessary? ]]> 2018-04-18T11:56:05+00:00 https://securityintelligence.com/when-nobody-controls-your-object-stores-except-you/ www.secnews.physaphae.fr/article.php?IdArticle=594351 False None None None Security Intelligence - Site de news Américain Lessons From the Marsh \'Global Cyber Risk Perception Survey\': Disconnects Persist Despite Increased Executive Involvement 2018-04-18T11:26:04+00:00 https://securityintelligence.com/lessons-from-the-marsh-global-cyber-risk-perception-survey-disconnects-persist-despite-increased-executive-involvement/ www.secnews.physaphae.fr/article.php?IdArticle=594352 False None None None Security Intelligence - Site de news Américain Collaboration Among Security Vendors Is the Threat Management Solution of the Future To stay ahead of tomorrow's cyberthreats, organizations need a threat management solution that consolidates disparate security products into a centralized platform. ]]> 2018-04-17T12:11:04+00:00 https://securityintelligence.com/collaboration-among-security-vendors-is-the-threat-management-solution-of-the-future/ www.secnews.physaphae.fr/article.php?IdArticle=592613 False None None None Security Intelligence - Site de news Américain Security at Your Fingertips: Introducing a New App for Security Professionals The new IBM app for security professionals allows users to assess the latest happenings in the world of cybersecurity intelligence, news and even the current state of their security environment. ]]> 2018-04-17T11:46:04+00:00 https://securityintelligence.com/security-at-your-fingertips-introducing-a-new-app-for-security-professionals/ www.secnews.physaphae.fr/article.php?IdArticle=592498 False None None None Security Intelligence - Site de news Américain Adversarial AI: As New Attack Vector Opens, Researchers Aim to Defend Against It While fraudsters have yet to master adversarial AI, the only way for the security community to get ahead of the emerging threat is through collaborative defense. ]]> 2018-04-17T10:01:04+00:00 https://securityintelligence.com/adversarial-ai-as-new-attack-vector-opens-researchers-aim-to-defend-against-it/ www.secnews.physaphae.fr/article.php?IdArticle=592356 False None None None