Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights Services.

I recently sat down with Kevin Albano, Associate Partner with IBM X-Force, to learn more about this new managed services offering.

Tell us how IBM X-Force Cyber Exposure Insights Services works?

Albano: With IBM X-Force Cyber Exposure Insights Services, the team first holds a kickoff meeting with the client to learn what matters most to the organization and about their external digital risks.  We also ask about keywords and key phrases that expose their organization, such as domain names, IP blocks and email addresses. Next, we begin basic monitoring for potential external threats. If there’s an instance of a fraudulent website or a brand impersonation then we can work with providers to take down the impersonation sites, which protects the organization’s brand reputation.

We started this service over a year ago in the Americas and Europe. Now, we are offering this service more consistently and are excited to amplify the successes we’ve already seen.

Can you share an example of how IBM X-Force Cyber Exposure Insights Services protected an organization?

Albano: With one organization we protect, we identified a fraudulent website before there was an attempt at fraud and had it taken down. Because we were looking for websites that were like our client’s official website, we detected threat actors creating the domain and hosting URL. We then contacted the domain register and hosting provider before the threat actors launched the website.

Discover Cyber Exposure Insights

How do clients benefit from using IBM X-Force Cyber Exposure Insights Services?

Albano: One of the biggest benefits that our customers tell us about after using our services is that they have assurance that their data and their client’s data is protected. We also see that our clients see a reduction in the number of notifications of credential issues or fraudulent websites because we are proactively resolving issues. When they know about a potential issue ahead of time, the company can manage identity and access controls in a more internal way.

Resources are always a big challenge with cybersecurity. How does IBM X-Force Cyber Exposure Insights Services help with resource management?

Albano: Before using IBM X-Force Cyber Exposure Insights Services, our clients typically used a portal to update keywords and manage notifications, which takes a lot of time and resources. With IBM X-Force Cyber Exposure Insights Services managing the indications of the keywords, our clients are able to use those resources in other ways.

Through monthly meetings, we go over all keywords and operations review practices to make sure that our efforts are best protecting the client’s environment. Our team works with both sides of the business — business and technical — to help the organizations understand both the cybersecurity and business perspective which helps us better protect their brand.

Do you have any other thoughts to share on your team’s managed services offerings?

Albano: As an organization and even as individuals, we have to manage our online risk and exposure. More than ever today, as both a society and a community we have to be conscious of what we put online. Each of us needs to realize how others can use data and information both for good and malicious.

To learn how IBM X-Force can help you with anything regarding cybersecurity including incident response, threat intelligence, or offensive security services schedule a meeting here.

If you are experiencing cybersecurity issues or an incident, contact X-Force to help: US hotline 1-888-241-9812 | Global hotline (+001) 312-212-8034.

More from Intelligence & Analytics

What makes a trailblazer? Inspired by John Mulaney’s Dreamforce roast

4 min read - When you bring a comedian to offer a keynote address, you need to expect the unexpected.But it is a good bet that no one in the crowd at Salesforce’s Dreamforce conference expected John Mulaney to tell a crowd of thousands of tech trailblazers that they were, in fact, not trailblazers at all.“The fact that there are 45,000 ‘trailblazers’ here couldn’t devalue the title anymore,” Mulaney told the audience.Maybe it was meant as nothing more than a punch line, but Mulaney’s…

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today