Vous êtes ici :   Accueil » RSS - net-security.org
 
Prévisualiser...  Imprimer...  Imprimer la page...
!Introduction
Technique
Outils
Base de connaissances
Visites

 1666502 visiteurs

 2 visiteurs en ligne

Contact

Notre site
griessenconsulting-Tag-Qrcode.png

info@griessenconsulting.ch

ch.linkedin.com/in/thierrygriessenCISA

Neuchâtel, Suisse


Mes coordonées
griessenconsulting-Tag-Vcard-OK.png

Crée votre Code

RSS - net-security.org

Help Net Security


Daily information security news with a focus on enterprise security.


Week in review: AD password reset best practices, new issue of (IN)SECURE  Voir?

Here’s an overview of some of last week’s most interesting news and articles: DNS over HTTPS’ threat to enterprise security DNS over HTTPS (DoH) is here, regardless who likes it or not. Unfortunately, a majority of guidance surrounding DoH is centered around individual consumer perspectives. For enterprise security leaders looking to manage the risks of DoH, that hasn’t been entirely helpful. How to test employee cyber competence through pen-testing Social engineering hacking preys on the … More

The post Week in review: AD password reset best practices, new issue of (IN)SECURE appeared first on Help Net Security.

... / ... Lire la suite

(15/12/2019 @ 12:00)

The importance of proactive patch management  Voir?

IT teams appreciate it when vendors or security researchers discover new vulnerabilities and develop patches for them. So do attackers. The same information that lets IT teams know where they may be vulnerable so they can take action, also lets attackers know where the weaknesses are – providing an opportunity and a map to guide them so they can develop an exploit. That means that once a vulnerability is disclosed, the clock starts ticking and … More

The post The importance of proactive patch management appeared first on Help Net Security.

... / ... Lire la suite

(13/12/2019 @ 07:35)

New infosec products of the week: December 13, 2019  Voir?

IBM Security adds AI features to its Cloud Identity solution IBM Cloud Identity now features AI-based adaptive access capabilities that help continually assess employee or consumer user risk levels when accessing applications and services. The solution escalates suspicious user interactions for further authentication, while those identified as lower risk are “fast tracked” so they can access applications and services they need. STEALTHbits launches Privileged Activity Manager with zero standing privilege architecture STEALTHbits Privileged Activity Manager … More

The post New infosec products of the week: December 13, 2019 appeared first on Help Net Security.

... / ... Lire la suite

(13/12/2019 @ 07:30)

Will quantum computing overwhelm existing security tech in the near future?  Voir?

More than half (54%) of cybersecurity professionals have expressed concerns that quantum computing will outpace the development of other security tech, according to a research from Neustar. Keeping a watchful eye on developments, 74% of organizations admitted to paying close attention to the technology’s evolution, with 21% already experimenting with their own quantum computing strategies. A further 35% of experts claimed to be in the process of developing a quantum strategy, while just 16% said … More

The post Will quantum computing overwhelm existing security tech in the near future? appeared first on Help Net Security.

... / ... Lire la suite

(13/12/2019 @ 07:00)

As malware and network attacks increase in 2019, zero day malware accounts for 50% of detections  Voir?

Amid significant increases in both malware and network attacks, multiple Apache Struts vulnerabilities – including one used in the devastating Equifax data breach – appeared for the first time on WatchGuard’s list of most popular network attacks in Q3 2019. Massive fallout from the Equifax breach The report also highlights a major rise in zero day malware detections and, increasing use of Microsoft Office exploits and legitimate penetration testing tools. Apache Struts 2 Remote Code … More

The post As malware and network attacks increase in 2019, zero day malware accounts for 50% of detections appeared first on Help Net Security.

... / ... Lire la suite

(13/12/2019 @ 06:30)

SaaS security fears: Is your data exposed to potential risk?  Voir?

IT executives have rising SaaS security fears, and worry about cloud security, proprietary data encryption, as well as the loss of independent control due to access limitations, according to Archive360. SaaS security fears The research surveyed more than 100 enterprise IT executives worldwide, to identify the leading security challenges they face with their SaaS vendors. Overall, those surveyed said they are troubled by the current level of security and accountability provided by their SaaS vendors. … More

The post SaaS security fears: Is your data exposed to potential risk? appeared first on Help Net Security.

... / ... Lire la suite

(13/12/2019 @ 06:00)

Cisco announces “internet for the future” strategy and new silicon architecture  Voir?

Cisco unveiled further details behind its technology strategy for building a new internet — one designed to push digital innovation beyond the performance, economic and power consumption limitations of current infrastructure. A multi-year approach that is defining the Internet for decades to come, Cisco’s strategy is already delivering technology breakthroughs to pave the way for the world’s developers to create applications and services they have only begun to imagine. Cisco introduced its latest innovation including … More

The post Cisco announces “internet for the future” strategy and new silicon architecture appeared first on Help Net Security.

... / ... Lire la suite

(13/12/2019 @ 05:15)

FireEye Cyber Physical Threat Intelligence provides data and analysis on threats to cyber physical systems  Voir?

FireEye, the intelligence-led security company, announced the availability of FireEye Cyber Physical Threat Intelligence. The new subscription provides context, data and actionable analysis on threats to cyber physical systems, including operational technology (OT), industrial control systems (ICS), Internet of Things (IoT) and other equipment used to manage interconnected physical processes. Detecting attacks at the intersection of virtual and physical worlds “While the intersection of the virtual and physical worlds has led to revolutionary connectivity and … More

The post FireEye Cyber Physical Threat Intelligence provides data and analysis on threats to cyber physical systems appeared first on Help Net Security.

... / ... Lire la suite

(13/12/2019 @ 05:00)

SentinelOne extends enterprise security platform with threat research and intelligence offering  Voir?

SentinelOne, the autonomous endpoint protection company, announced the launch of SentinelLabs, a research division designed to identify new attack vectors and mitigate threats impacting businesses. Led by famed cybersecurity researcher Vitali Kremez, SentinelLabs is powering SentinelOne’s first threat intelligence offering, a managed threat monitoring and reporting service designed to equip SentinelOne customers with analyst coverage of the latest cybersecurity tactics and techniques. With the launch of the new threat intelligence platform, SentinelOne provides clients with … More

The post SentinelOne extends enterprise security platform with threat research and intelligence offering appeared first on Help Net Security.

... / ... Lire la suite

(13/12/2019 @ 04:30)

Dynatrace’s open source control plane simplifies IT’s journey to NoOps for cloud native environments  Voir?

Dynatrace announced Keptn, an open source pluggable control plane to advance the industry movement toward autonomous clouds. Keptn provides the automation and orchestration of the processes and tools needed for continuous delivery and automated operations for cloud native environments. To combat the growing gap between constrained IT resources and accelerating cloud scale and complexity, automation and AI have become critical weapons for IT to maintain control. However, where to start and how to map out … More

The post Dynatrace’s open source control plane simplifies IT’s journey to NoOps for cloud native environments appeared first on Help Net Security.

... / ... Lire la suite

(13/12/2019 @ 04:15)

Dernière mise à jour : 15/12/2019 @ 18:35