Magazines

Retour à Sécurité

Les Affaires – Cyber sécurité

    Wired

    Cyber defense magazine

      • The Challenge of Real-Time Cyber Protection 21 février 2019
        Appropriate Response Mechanisms When a Data Breach Occurs By John Attala, Director, North America, Endace There’s a huge imbalance between attackers and defenders when it comes to protecting the corporate network. Defenders must protect against a myriad of threats while an attacker only needs to find one vulnerability to gain a foothold into the network. Once past the layers of real-time protectio …

      • Cyber security for Kids 21 février 2019
        Sitting on the couch: Talking about security with the kids. by Pedro Tavares,  Founder of CSIRT.UBI & Cyber Security Blog seguranca-informatica.pt Talking about cybersecurity is crucial these days. Children are born in a cyber age and they represent a weakness from the security point-of-view. Due to that, it’s essential to provide them with cyber-knowledge, show what kind of information is ava …

      • Strength through Simplification: Taming Cyber security Complexity in 2019 21 février 2019
        By Zach Malone, security engineer, FireMon Cybersecurity in 2018 can be best described in one word: complex. Yes, complexity has infiltrated every phase of the cybersecurity landscape this year, from bloated and expensive IT infrastructures to sophisticated cyber-attack methods, too complicated compliance mandates. The aftermath of the complexity epidemic has caused countless data breaches, exacer …

      • Schneier says: Technology—our biggest asset. And headache. 20 février 2019
        It’s happening all around us. Computers are taking roles we never thought they could. They’re our weathermen. Our cashiers. But is cutting people out of the equation really the recipe for security success? Bruce Schneier says, not so much. In his RSA Conference 2018 session, Security Orchestration and Incident Response, trailblazing cryptography expert Bruce Schneier addresses the common divides b …

      • What is Genetic Malware Analysis? 20 février 2019
        By Roy Halevi At Intezer, we view malware analysis as a key component in properly and effectively responding to security incidents. We have introduced a new innovative approach to automate malware analysis and provide clear insights into any suspicious file. We call this approach Genetic Malware Analysis. In writing this piece, I wanted to define Genetic Malware Analysis and explain how our techno …

      • Experts found a Remote Code Execution flaw in WordPress 5.0.0 20 février 2019
        Security experts disclosed a critical remote code execution vulnerability in versions of WordPress prior 5.0.3, that remained uncovered for 6 years. Security experts at RIPS Technologies GmbH disclosed a critical remote code execution vulnerability in versions of WordPress prior 5.0.3, that remained uncovered for 6 years. The experts discovered that the flaw could be exploited by an attacker who g …

      • Three Common Security Mistakes and Best Practices to Eliminate Them in the New Year 20 février 2019
        By Zach Malone, security engineer, FireMon During this time of year, we see endless articles projecting predictions for the year ahead. And while predictions can help organizations prepare for potential new technologies, processes and other developments that might impact their business, they can also be wrong. That’s why there’s tremendous value in looking into the rear view mirror this time of ye …

      • Application Isolation and Control – A Modern Defense for New Threats 20 février 2019
        By Fraser Kyne, EMEA CTO, Bromium  The detection method for preventing malware is fundamentally flawed, yet it is still the de facto standard in cybersecurity. Day after day, organizations scramble to protect against a growing number of threats, but all it takes is one piece of malware to go undetected to wreak havoc on IT systems. Ironically, this was predicted by Alan Turing more than 80 years a …

      • Can Endpoint Isolation Finally Thwart Cyber attackers? 20 février 2019
        Standard security strategies aren’t working so enterprises are turning to isolation-based prevention by Tal Zamir, Co-Founder & CEO, Hysolate Endpoints are a favorite target for cyber attackers. They’re also the Achilles heel of any enterprise’s security strategy. As studies show, endpoint vulnerabilities are only getting worse as attackers get more sophisticated and employees unwittingly expo …

      • New Trickbot module implements Remote App Credential-Grabbing features 19 février 2019
        The Trickbot banking trojan continues to evolve, Trend Micro detected a new variant that includes a new module used for Remote App Credential-Grabbing. The infamous Trickbot banking trojan is back, experts at Trend Micro detected a new strain of the malware using an updated info-stealing module. The new strain of the Trickbot banking trojan that a updated info-stealing module. llows it to harvest …

    CIO

      • The 11 biggest issues IT faces today 15 février 2019
        Each year we talk with tech leaders about the biggest problems they’ll face in the near future, and we’re starting to see some subtle and not-so-subtle shifts from the worries of 2018.Data overload, a major concern 12 months ago, has evolved as new data-hungry tools and AI help make sense of data and drive business decisions. This year CIOs say they’re more concerned with how to protect that data, …

      • Get TotalAV Essential AntiVirus for $19.99 (80% off) 7 février 2019
        The term “computer virus” calls to mind imagery of pathogenic creepy-crawlies bringing down a device’s operating system, their flagella wriggling as they multiply into hordes that infiltrate its chips and wires. And while it’s true that our computers can be infected with literal biological bacteria like staphylococci, per Science Illustrated, the threat of malicious codes and programs intent on co …

      • Get 3 Years of NordVPN Service for Just $2.99 Per Month – Deal Alert 18 janvier 2019
        NordVPN promises a private and fast path through the public internet, with no logs, unmetered access for 6 simultaneous devices and access to 5,232 servers worldwide. They are currently running a promotion, but you’ll have to use this link to find it. Its typical price has been discounted for 3 years of service — a good deal at just $2.99 per month.  See the $2.99/month NordVPN deal here. To read …

      • 7 things IT should be automating 9 janvier 2019
        To take advantage of innovations like artificial intelligence you must first move away from manual processes. For that reason alone, automation should be a key short-term priority for most CIOs.Automation isn’t just about saving time or money. Done well, automation reduces errors, increases employee satisfaction by freeing staff from tedious tasks, improves the customer experience and allows you t …

      • The 6 best password managers 25 mai 2017
        Thanks to the continuous barrage of high-profile computer security scares and reports of cloud-scale government snooping, more of us Internet users are wising up about the security of our information. One of the smarter moves we can make to protect ourselves is to use a password manager. It’s one of the easiest too.A password manager is an excellent first step in securing your online identity, hel …

      • Network monitoring tools: Features users love and hate 1 mai 2017
        Managing the health of the corporate network will directly affect the productivity of every user of that network. So network administrators need a robust network monitoring tool that helps them manage the network, identify problems before they cause downtime, and quickly resolve issues when something goes wrong.Five of the top network monitoring products on the market, according to users in the IT …

      • Fight firewall sprawl with AlgoSec, Tufin, Skybox suites 10 avril 2017
        New and innovative security tools seem to be emerging all the time, but the frontline defense for just about every network in operation today remains the trusty firewall. They aren’t perfect, but if configured correctly and working as intended, firewalls can do a solid job of blocking threats from entering a network, while restricting unauthorized traffic from leaving.The problem network administr …

      • Backup software features that IT managers love and hate 5 avril 2017
        With corporate data more important than ever, selecting the best data backup and recovery software for the organization would be a career-enhancing move. According to online reviews by enterprise users in the IT Central Station community, three of the top backup and recovery products on the market are Veeam Backup, HP Enterprise’s Data Protector, and Altaro VM Backup. What do enterprise users real …

      • Zix wins 5-vendor email encryption shootout 13 mars 2017
        Email encryption products have made major strides since we last looked at them nearly two years ago. They have gotten easier to use and deploy, thanks to a combination of user interface and encryption key management improvements, and are at the point where encryption can almost be called effortless on the part of the end user. Our biggest criticism in 2015 was that the products couldn’t cover mult …

      • Get TotalAV Essential AntiVirus for $19.99 (80% off) 7 février 2019
        The term “computer virus” calls to mind imagery of pathogenic creepy-crawlies bringing down a device’s operating system, their flagella wriggling as they multiply into hordes that infiltrate its chips and wires. And while it’s true that our computers can be infected with literal biological bacteria like staphylococci, per Science Illustrated, the threat of malicious codes and programs intent on co …

    Tech Republic

    ZDnet