IBM Security Guardium Named Industry Leader for Third Consecutive Time

3 min read - KuppingerCole named IBM Security Guardium an overall business leader in their Leadership Compass on Database and Big Data Security Solutions. IBM was also again ranked as a leader in all three sections: product, innovation and market. With this in mind, take a…

3 min read

Internet of Threats: IoT Botnets Drive Surge in Network Attacks

6 min read - As Internet of things (IoT) devices in homes, industrial environments, transportation networks and elsewhere continue to proliferate, so does the attack surface for malicious IoT network attackers. IoT attack activity in 2020 dramatically surpassed the combined volume of IoT activity observed by IBM Security X-Force in 2019. Turning our attention…

3 min read

Data Poisoning: When Attackers Turn AI and ML Against You

5 min read - Stopping ransomware has become a priority for many organizations. So, they are turning to artificial intelligence (AI) and machine learning (ML) as their defenses of choice. However, threat actors are also turning to AI and ML to launch their attacks. One specific type of attack, data poisoning, takes advantage of this. Why…

3 min read

Cloud Native Tools Series Part 3: Get the Right Tools

3 min read - As we near the end of our journey into cloud native tools, let’s take a look at visibility. In a previous post, I discussed how business entities need to understand their end of the Amazon Web Services (AWS) shared security model to uphold their cloud defense duties. This knowledge can…

3 min read

‘Inbox Zero’ Your Threat Reports: How to Combat Security Alert Fatigue

3 min read - At best, a new cybersecurity alert should trigger immediate action. But we all know in practice that work is not always clear cut. A new alert can find itself as just the latest un-addressed number in the inbox. In an inbox-zero case, the latest new alert is the most urgent…

3 min read

Progressive Web Apps and Cookies: Taking a Bite Out of Security

6 min read - To prevent cookie theft, have cyber defense baked in. With progressive web apps (PWA) and other relatively new protective efforts in place, how can you be sure you’re defending against today’s attackers? Here’s what enterprise needs to know about the rumbling threat of pass-the-cookie attacks, how current cloud and mobile…

3 min read

How AI in Cybersecurity Addresses Challenges Faced by Today’s SOC Analysts

2 min read - Today’s security operations centers (SOC) have to manage data, tools and teams dispersed across the organization, making threat detection and teamwork difficult. There are many factors driving complex security work. Many people now work from home with coworkers in far-away places. The cost and maintenance of legacy tools and the migration to cloud also make […]

2 min read

How AI in Cybersecurity Addresses Challenges Faced by Today’s SOC Analysts

2 min read - Today’s security operations centers (SOC) have to manage data, tools and teams dispersed across the organization, making threat detection and teamwork difficult. There are many factors driving complex security work. Many people now work from home with coworkers in far-away…

2 min read

Combating Sleeper Threats With MTTD

6 min read - During the SolarWinds Orion supply chain compromise, threat actors lurked in the victim’s network for more than a year. Discovered by FireEye in December 2020, the earliest traces of a modified SolarWinds Orion go back as early as October 2019.…

6 min read

Ransomware Attacks in 2021: Information Meets Emotion

4 min read - “If you want to go quickly, go alone, but if you want to go far, go together.” This African proverb opens the Sophos 2021 Threat Report, and in view of recent cybersecurity events, its meaning is very important when it…

4 min read

How to Design and Roll Out a Threat Model for Cloud Security

4 min read - Today’s cloud security requires a new way of looking at threat models. Making a threat model can support your security teams before problems start. It helps them develop a strategy for handling existing risks, instead of detecting incidents at a…

4 min read

Why Security Pros Can’t Ignore Big Data Monopolies

4 min read - The rise of the cloud didn’t free us from concerns over who stores our data. Where matters, and major cloud providers and big data monopolies host a huge percentage of the world’s data. Thousands of organizations that store and manage…

4 min read

AI Security: How Human Bias Limits Artificial Intelligence

6 min read - For cybersecurity experts, artificial intelligence (AI) can both respond to and predict threats. But because AI security is everywhere, attackers are using it to launch more refined attacks. Each side is seemingly playing catch-up, with no clear winner in sight.…

6 min read

The IT-OT Connection: How the Two Work Together

4 min read - Where hardware meets software, attackers can sneak in. More and more, threat actors are targeting Industrial Control Systems (ICS) and Operational Technology (OT). IBM X-Force found that the number of attacks against those types of assets increased by over 2,000%…

4 min read

Don’t Stop At ‘Delete:’ How Privacy Needs Are Shaping Data Destruction

4 min read - It’s just part of the job: at some point in a device’s lifecycle, data must be destroyed. While deleting files may mean users and apps can’t access them, simple deletion isn’t enough to truly destroy the data. To be most…

4 min read

Turning Down the Noise: Adding Context to the SIEM With Modern Data Security

3 min read - Let’s say I tell you that my daughter crawled today. However, you don’t know if my daughter is an infant or 30 years old. If you ask, and I tell you my daughter is an infant, you still don’t know…

3 min read
Failed to load data