52 Posts

Pamela Cobb

Market Segment Manager, IBM X-Force and Security Intelligence

Pamela Cobb directs product marketing activities for the IBM X-Force and Threat Protection offerings developing messaging, collateral, website content. She came to IBM through the acquisition of Internet Security Systems, where she managed the Competitive Intelligence function. Elsewhere in IBM, Pam has worked in database marketing and market insights focusing on Midmarket and Hardware products She's earned the IBM Forward Thinker Award and IBM Global Best Database Marketing Practice Award, and has been published in the Journal of Competitive Intelligence.

Written By Pamela Cobb

Don’t Click on That! Practical User Education for Ransomware and Other Malware

Malware and ransomware can strike users who aren't aware of best practices or common attack techniques, so it's up to security teams to raise awareness.

Markdown: Designer Vulnerabilities Get a Fresh CVSS v3 Look

The Common Vulnerability Scoring System (CVSS) has been completely redone to more accurately reflect the scope and impact of vulnerabilities.

The Myth of One-Hour Forensics

Real-life incident forensics isn't like what's portrayed in Hollywood. But with the right security intelligence, you can still solve the mystery quickly.

The Myth of the Obvious Malware

Malware doesn't present itself like it's often depicted in the movies, so it's up to enterprises to be on the lookout for these stealthy programs.

The Myth of the Omnipotent Hacker

The way movies and television shows portray a hacker is far off from reality. In today's collaborative world, attackers are often working in crime rings.

No One Expects a Spam-ish Imposition

Just because you're familiar with spam and use rudimentary defenses to prevent it doesn't mean it's not a threat to your organization.

Does ‘Mr. Robot’ Reprogram the Hollywood Hacker Mindset?

The USA Network will debut "Mr. Robot" this summer, but just how realistic is this portrayal of cybersecurity, hacktivism and black-hat practices?

IBM X-Force Threat Intelligence Quarterly – 2Q 2015

The rise of social media, cloud, mobility and big data makes insider threats harder to identify, and provide more ways to pass protected information. The average organization monitored by IBM Security Services experienced approximately 81 million...

The Life of a Cyberthreat

Ever wonder how cyberattacks and malware are created, and how they get into your system to steal your data? See the life of a cyberthreat first hand, from the moment of its inception within the Dark Web of hackers, to when it is sent around the...

From the Dark Web to Your Data: Uncovering the Life of a Cyberthreat With Community Knowledge

IBM's X-Force Exchange emphasizes collaboration and intelligence sharing, using strategies used in the Dark Web to promote security and defeat criminals.