12 Posts

Caleb Barlow

Vice President - IBM Security

Caleb Barlow is an accomplished security professional and Vice President at IBM Security, where he leads IBM's Threat Intelligence and Incident Response Teams globally. He was the visionary behind X-Force Command, the worlds most sophisticated watch floor and cyber range. Mr. Barlow has a broad background having led technical teams in product development, product management, strategy, marketing and cloud service delivery. He has led multiple acquisitions including Fiberlink MaaS360 and Net Integration Technologies. Mr. Barlow routinely advises chief information security officers, boards of directors and government officials on security practices, frameworks and strategies to manage the business risk associated with cyber security. Mr. Barlow is a sought after speaker on the subject of security. He has appeared on the TED stage, NBC TODAY, NBC News, Bloomberg Television, CNBC Squawk Box, Yahoo News, Al Jazeera America and the BBC World Service. Caleb's views have appeared in the Wall Street Journal, Washington Post, USA Today, eWeek, FastCompany, Seventeen and dozens of other publications. He has testified to the US Congress and in 2015 he was invited by the President of the UN General Assembly to discuss his views at the United Nations.

Written By Caleb Barlow

As Seen on TV: Important Lessons for Winning the Fight Against Cybercrime

The Science Channel documentary, "Dark Web: Fighting Cybercrime," shows why practice runs are essential to help security teams and business leaders keep their cool in the face of a cyberattack.

WHOIS Behind Cyberattacks? Under GDPR, We May Not Know

GDPR's implementation on an issue relevant to the cybersecurity industry may well have negative consequences that (ironically) run contrary to its original intent.

New Year, New Threats: Five Security Predictions That Will Take Hold in 2018

The IBM Security X-Force team offered some security predictions for new trends in the technology landscape and threats that are poised to emerge in 2018.

When a Cyber Crisis Hits, Know Your OODA Loops

OODA loops can help System 1-thinking security professionals react swiftly to cyberattacks and embrace an intuitive approach to incident response.

Crisis Leadership, Part 2: What Are We Learning?

In addition to responding to threats in progress, crisis leadership involves rehearsing various responses to prepare for a data breach.

It’s Time for the Democratization of Cybersecurity Data

The widespread democratization of cybersecurity data would enable the IT industry to keep up with cybercriminals who always seem to be one step ahead.

Crisis Leadership: The Missing Link in Cyberattack Defense

C-suite executives often lack the experience and training required to establish and lead a successful cyberattack defense program.

Attackers Shift Sights From Retail to Health Care in 2015

In 2015, there has been a tremendous uptick in the theft of health care data and a decrease in the number of compromised retail records. Why?

Effective Endpoint Security and Management: Coupling Content With Context

The most effective endpoint security solution needs to have both content and context in order to help professionals remediate problems.

Six-Digit Passcodes: Two Small Steps for Smartphones, One Giant Leap for Mobile Security

Apple now requires six-digit passcodes (instead of four) on its devices — meaning two small steps for users, but one giant leap for mobile security.

Co-Written By Caleb Barlow

Ransomware Report: Top Security Threat Expected to Continue Rising in 2017

To pay or not to pay? When it comes to ransomware, that is the question. Despite a rise in attacks, organizations are largely unaware of the threat.