Vous êtes ici :   Accueil » RSS - net-security.org
 
Prévisualiser...  Imprimer...  Imprimer la page...
!Introduction
Technique
Outils
Base de connaissances
Visites

 1568695 visiteurs

 4 visiteurs en ligne

Contact

Notre site
griessenconsulting-Tag-Qrcode.png

info@griessenconsulting.ch

ch.linkedin.com/in/thierrygriessenCISA

Neuchâtel, Suisse


Mes coordonées
griessenconsulting-Tag-Vcard-OK.png

Crée votre Code

RSS - net-security.org

Help Net Security


Daily information security news with a focus on enterprise security.


Aerohive Networks announces availability plans for its pluggable access point  Voir?

Aerohive Networks released worldwide availability plans for its pluggable Wi-Fi access point, the Aerohive Atom AP30. Currently shipping with a Type A/B plug, Aerohive has now announced Type C and G plugs availability for Q3 2018, enabling customers who use the EU or UK-plug type to benefit from Wi-Fi connectivity that can be both deployed, and re-deployed, in a matter of minutes. Aerohive Atom AP30 is designed to augment or replace traditional ceiling and wall-mounted … More

The post Aerohive Networks announces availability plans for its pluggable access point appeared first on Help Net Security.

... / ... Lire la suite

(20/07/2018 @ 19:03)

Socure’s Aida establishes trust and certainty for online financial transactions  Voir?

Socure announced Aida (Authentic Identity Agent), the bot for establishing trust in online transactions. Named in honor of Ada Lovelace, the world’s first computer scientist, Aida uses artificial intelligence to process billions of multi-dimensional online and offline data points per second to validate the authenticity of digital identities in real-time. According to the Javelin Strategy & Research 2017 Identity Fraud Study, due to the increasing adoption in the US of EMV (chip) cards and terminals … More

The post Socure’s Aida establishes trust and certainty for online financial transactions appeared first on Help Net Security.

... / ... Lire la suite

(20/07/2018 @ 19:00)

Windstream Enterprise announces SD-WAN Cloud Connect to enhance enterprise cloud migration  Voir?

Windstream Enterprise announced that it has launched SD-WAN Cloud Connect, a way for enterprises to connect all their network locations to their cloud-based applications. Offered in collaboration with VeloCloud, now part of VMware, SD-WAN Cloud Connect is the answer to the enterprise need for agility, affordability, visibility and control with secure, private, dedicated access to leading third-party cloud service providers. “The introduction of SD-WAN Cloud Connect represents a significant milestone in our SD-WAN journey,” says … More

The post Windstream Enterprise announces SD-WAN Cloud Connect to enhance enterprise cloud migration appeared first on Help Net Security.

... / ... Lire la suite

(20/07/2018 @ 18:59)

Diffy: A triage tool for cloud-centric incident response  Voir?

The Netflix Security Intelligence and Response Team (SIRT) has released Diffy, an open source triage tool that allows digital forensics and incident response teams to quickly pinpoint compromised hosts during a security incident on cloud architectures. The name of the tool comes from its function: it identifies differences between instances that might point to a compromise (an unexpected listening port, a running process with an unusual name, a strange crontab entry, a surprising kernel module, … More

The post Diffy: A triage tool for cloud-centric incident response appeared first on Help Net Security.

... / ... Lire la suite

(20/07/2018 @ 17:58)

Dealing with a system launch: It requires more than just testing  Voir?

Rolling out new IT systems or software can be a challenge and fraught with issues from day one – and the recent IT crisis with TSB has shown how damaging these can be if managed poorly. A lack of pre-launch tests has been raised as a potential cause of immediate failures, but it would be simplistic to suggest that this would completely eliminate the problems that companies encounter following a system launch. A successful launch … More

The post Dealing with a system launch: It requires more than just testing appeared first on Help Net Security.

... / ... Lire la suite

(20/07/2018 @ 13:45)

Cyber Chief Magazine: GDPR Winning Moves  Voir?

This issue delivers a ready-to-use GDPR kit packed full of how-to’s and practical tips that companies need to implement so they don’t end up on the wrong side of an audit. You’ll get the actionable insights you need today, without unnecessary compliance theory. Content in this edition: GDPR Confusion: 7 Common Myths Busted How to Jump-Start GDPR Risk Assessment GDPR Fines: What Should You Expect? …and more!

The post Cyber Chief Magazine: GDPR Winning Moves appeared first on Help Net Security.

... / ... Lire la suite

(20/07/2018 @ 13:33)

Cybersecurity no longer top risk for telecom industry  Voir?

Telecommunications executives have relegated disruption from new technologies to third place in their risk top 5: the number one risk identified by 60 telecom companies surveyed right now is exchange rate volatility, according to phone companies and internet providers. This latest edition of the BDO 2018 Telecommunications Risk Factor Survey ranks the 5 most significant risks facing telecoms companies as follows: Exchange rate/foreign currency changes Increased competition The fast arrival of new technologies Access to … More

The post Cybersecurity no longer top risk for telecom industry appeared first on Help Net Security.

... / ... Lire la suite

(20/07/2018 @ 13:30)

Capturing the conscience of the computing profession  Voir?

After a two-year process that included extensive input from computing professionals around the world, ACM, the Association for Computing Machinery, has updated its Code of Ethics and Professional Conduct. The revised Code of Ethics addresses the significant advances in computing technology and the growing pervasiveness of computing in all aspects of society since it was last updated in 1992. ACM’s Code of Ethics is considered the standard for the computing profession, and has been adopted … More

The post Capturing the conscience of the computing profession appeared first on Help Net Security.

... / ... Lire la suite

(20/07/2018 @ 13:20)

Utimaco HSM protects digital wallets and cryptocurrencies  Voir?

Utimaco partners with ThothTrust to protect digital wallets and their cryptocurrency assets with Utimaco HSMs and the CryptoScript Software Development Kit (SDK). The Customizable Secure Cryptography (CSC) product offers different security levels and customization options to create a secure environment corresponding to the customer’s requirements. In the case of digital wallets, a Wallet Security Module (WSM) ensures cryptocurrency asset security based on a Utimaco HSM as its hardware root of trust. The Utimaco HSM equipped … More

The post Utimaco HSM protects digital wallets and cryptocurrencies appeared first on Help Net Security.

... / ... Lire la suite

(19/07/2018 @ 23:39)

Okta acquires ScaleFT to bring Zero Trust to the enterprise  Voir?

Okta announced it has acquired ScaleFT. Together, Okta and ScaleFT will bring Zero Trust to the enterprise by providing organizations with a framework to protect data, without compromising on experience. As the proliferation of applications and devices continues, the network perimeter is disappearing and organizations must rethink how they secure their extended enterprises — employees, contractors and partners. Organizations of every size are realizing the criticality of moving to a Zero Trust framework by building … More

The post Okta acquires ScaleFT to bring Zero Trust to the enterprise appeared first on Help Net Security.

... / ... Lire la suite

(19/07/2018 @ 23:36)

Dernière mise à jour : 20/07/2018 @ 07:43