Written By Louise Byrne

A Beginner’s Guide to Threat Hunting

Threat hunting is a complex and labor-intensive task, but it can go a long way toward helping your organization detect APTs before they can cause damage to the network.

Collaboration Is Key: Security Leaders Team Up at the London Security Summit

On May 15, over 100 security leaders from across the U.K. and Europe met to talk about the future of cybersecurity and promote collaboration to stay one step ahead of evolving cyberthreats.

Why No CISO Should Miss IBM’s London Security Summit

On May 15, 2018, IBM is holding a unique one-day security summit at the Institution of Engineering and Technology (IET) in the heart of London. Learn more in an interview with Rob Sedman.

Why Data Security Should Be Top of Every Retailer’s Shopping List

Thanks largely to recent news headlines, consumers are becoming more aware of security concerns, meaning that retailers must improve their data security practices to earn customer trust.

SECaaS Is Where It’s At: Why Security-as-a-Service Is the Next Big Thing

Security leaders are increasingly turning to security-as-a-service (SECaaS) to keep up with rapidly evolving threats and address the growing skills shortage.

Three Things We Learned at the London i2 Community Event

At this year's i2 Community Event in London, experts from IBM and other technology firms educated attendees about practical use cases for threat hunting and how it relates to GDPR preparation.