Magazines

Retour à Sécurité

Les Affaires – Cyber sécurité

    Wired

    Cyber defense magazine

      • 28 septembre 2020Cyber Liability Insurance – Safe Bet or Sales Gimmick?
        By Darren T. Kimura, Spin Technology The threat of ransomware is rising rapidly. Each day, we see more stories about companies overtaken by this type of cyberattack. Garmin and Canon, two well-known consumer brands, are the most recent examples of organizations that paid large sums of money to criminal organizations to regain access to their […] The post Cyber Liability Insurance – Safe Bet …

      • 27 septembre 2020Mapping Automation to the MITRE ATT&CK Framework
        By Chris Calvert, vice president, product strategy, and co-founder Respond Software As major enterprises race to digitize their IT and line of business infrastructures, cybersecurity has become an imperative, both from a business and regulatory perspective. Yet these same forces of digitization and the rise of software have proliferated vulnerable points of access to sensitive […] The post M …

      • 25 septembre 2020Privacy Shield Revoked
        What This Means for EU-US Commercial Data Transfers By Dan Piazza, Technical Product Manager, Stealthbits Technologies On July 16th, the European Court of Justice (ECJ) struck down the EU-US data privacy agreement named Privacy Shield, which many organizations rely on to transfer data between the EU and the U.S. Privacy Shield was enacted in 2016 […] The post Privacy Shield Revoked appeared …

      • 24 septembre 2020Manual vs. Automatic Cybersecurity Testing: What’s the Difference?
        By Tamir Shriki, Customer Operations Manager, XM Cyber In the context of cybersecurity, if you want to protect something, you need the ability to test its defenses. It’s the only way to maintain visibility into the true state of your security posture. The key question, however, is this: How does one get the best and […] The post Manual vs. Automatic Cybersecurity Testing: What’s …

      • 23 septembre 2020German investigators blame Russian DoppelPaymer gang for deadly hospital attack
        The investigation of German authorities on the recent attack on the Dusseldorf hospital reveals the possible involvement of Russian hackers. Last week, German authorities revealed that a cyber attack hit a major hospital in Duesseldorf, the Duesseldorf University Clinic, and a woman who needed urgent admission died after she had to be taken to another […] The post German investigators blame …

      • 23 septembre 20205 Ways to Avoid Security Automation Pitfalls
        By Joe Partlow, CTO at ReliaQuest Amid an enterprise attack surface that is more complex than ever, many security teams have turned to automation to boost threat detection and response. When implemented correctly, security automation can help increase visibility and control over an ever-expanding environment and across the entire security lifecycle. One of automation’s major […] The post 5 W …

      • 22 septembre 2020Mozi Botnet is responsible for most of the IoT Traffic
        The Mozi botnet accounted for 90% of the IoT network traffic observed between October 2019 and June 2020, IBM reported. Mozi is an IoT botnet that borrows the code from Mirai variants and the Gafgyt malware, it appeared on the threat landscape in late 2019. The Mozi botnet was spotted by security experts from 360 […] The post Mozi Botnet is responsible for most of the IoT Traffic appeared fi …

      • 22 septembre 2020Weaknesses of Biometric Authentication
        By Mark Perkins, MS, CISSP, IT Manager In today’s digital world, knowing who is on the other end of the wire is more important than ever.  The democratization of digital technology and proliferation of Internet access, in addition to the transformation from physical to virtual, has created a new era of criminal activity.  Currency, for […] The post Weaknesses of Biometric Authentication appe …

      • 21 septembre 2020Media Content Captured on Mobile Is Driving Compliance Problems
        Photos, Videos, and Other Multi-Media Content Captured by Employees Are Easily Shared and Rarely Governed By Josh Bohls, CEO, Inkscreen Recent headlines are once again demonstrating the consequences of employees’ inappropriate leaking photos from mobile devices, and are shedding new light on a problem that security and compliance experts have warned about for years. Multimedia […] The …

    CIO

      • 10 septembre 2020Returning to the workplace: IT’s role
        When the pandemic hit the U.S. with a vengeance, most companies made on-the-fly decisions to shut down the workplace, forcing employees to make the switch to work from home with little to no warning. Ensuring that everyone had the right equipment and the ability to connect to the corporate networks – and do so securely – in a matter of hours was a challenge for IT and security teams. It was, safe …

(Insider Story)

  • 28 août 2020Inside Adobe's employee-focused COVID-19 response roadmap
    When faced with the COVID-19 crisis earlier this year, Adobe’s IT organization, like many others, acted quickly to shift the entire company to a work-from-home situation. For us that meant moving the entire Adobe workforce of more than 22,000 global employees over a single weekend. The pandemic also forced us to focus more critically on such things as collaboration strategies, security, and the em …

  • 24 août 2020A 10-point plan for addressing WFH cybersecurity challenges
    “How should we adapt our cybersecurity controls to address the new WFH reality? » This question is top-of-mind for CIOs and security executives. When it comes to cybersecurity in the post-COVID era, every CIO needs an answer to three key questions:To read this article in full, please click here(Insider Story) …

  • 9 juillet 2020What is the Risk Management Framework (RMF)? A standardized security framework
    The Risk Management Framework (RMF) was developed and published by the National Institute of Standards and Technology (NIST) in 2010 and later adopted by the Department of Defense (DoD) to act as criteria for strengthening and standardizing the risk management process of information security organizations. The framework can be used by nearly any company interested in bolstering cybersecurity and r …

  • 1 juillet 2020Ellie Mae turns to AI for autonomous threat hunting
    In the information security field, bad actors have the advantage: They play proactive offense while security is generally reactive in defense. To take a more proactive footing, some organizations have been adopting threat intelligence, a security practice that involves sifting through data to identify advanced persistent threats (APTs) before attacks occur. Firms such as Ellie Mae, which provides …

Tech Republic

ZDnet