6 Posts

Nick Bradley

Practice Lead, Threat Analysis Group IBM X-Force IRIS

    Nick Bradley possesses more than 20 years of physical and cyber security experience. Nick currently manages IBM’s X-Force Threat Analysis Group which is a part of the X-Force IRIS organization.Nick has been with IBM for over 13 years functioning in many key roles within the Security division. These roles span from Senior Operations Manager, X-Force Threat Analysis Team Manager, and IT-ISAC Director of Operations. He is one of IBM’s public relations speakers on security matters and has spoken at multiple conferences, webcasts and podcasts.Prior to IBM, Nick worked in many other positions as an analyst and manager. Additionally, he also served in the United Stated Army as a systems administrator, military policeman, and team lead of an SRT (Special Reaction Team).

    Written By Nick Bradley

    Cybersecurity Tips to Help Retailers and Consumers Stay Secure During the Holiday Season

    Consumers and retailers should implement these basic cybersecurity tips year-round to stay secure during the busy holiday shopping season.

    Relax and Shop, We’re Keeping Watch

    The IBM X-Force Threat Research team is keeping watch on all things retail during the upcoming Black Friday through Cyber Monday shopping weekend.

    Compromised Before My Very Eyes: How I Almost Got Hacked

    Here's the story of how I almost got hacked — and what you can learn from my close call to ensure the data breach doesn't happen to you.

    Danger on the Perimeter! About the Cisco ASA Vulnerability

    Cisco disclosed a vulnerability alert for their Adaptive Security Appliances (ASAs). The accompanying Cisco ASA alert should be of major concern.

    Financial Services Threat Landscape: Where’s the Money?

    The financial services sector remains the most targeted industry when it comes to cyberattacks, with campaigns such as Dyre Wolf leading the way.

    The Threat Is Coming From Inside the Network: Insider Threats Outrank External Attacks

    Outside attackers can be harmful to an organization, but a significant number of data breaches involve either malicious or inadvertent insider threats.