186 Posts

Security Intelligence Staff

Security Intelligence Staff

    Security Intelligence strives to be the leading site for technical and business-focused security content. Security is an essential factor for every business, and we want to help you adapt to and safeguard against its ever-changing landscape.

    Written By Security Intelligence Staff

    What’s So Revolutionary About the Cognitive Revolution?

    Most traditional security tools, including highly advanced ones, still focus mainly on structured and semi-structured machine data, such as system logs and data flow. This information is of critical importance to security analysts, but it cannot...

    Using Cognitive Security Solutions to Combat Cyber Scum and Villainy

    Cognitive security solutions will help IT analysts tackle long-term strategic issues rather than firefighting against the overwhelming volume of threats.

    IBM X-Force Exchange: Strategic and Tactical Uses of Threat Intelligence

    What you don’t know about threat intelligence might surprise you. While you can use threat intelligence feeds as context for enriching alerts and speeding time to action, correlating that intelligence to internal network data can enrich...

    Cybersecurity in the Cognitive Era: Priming Your Digital Immune System

    What might cybersecurity look like in the cognitive era? IBM recently conducted a survey of more than 700 security professionals, leaders and practitioners from 35 countries to get a sense of the toughest challenges they are facing, how these...

    Track Relevant Vulnerabilities With Watchlists

    The watchlist feature on IBM X-Force Exchange enables network administrators to maintain accurate asset inventories and track relevant vulnerabilities.

    New Partnership Aims to Help Organizations Patch Vulnerabilities Fast and With Confidence

    Written by John Markott, Director of Product Management, Carbon Black and I-Lung Kao, BigFix Product Manager, IBM Security Vulnerability management is one of the biggest problems plaguing the security industry today. According to Gartner’s...

    It Came From Inside The Network (and Other Horror Stories in Security)

    Listen to this spooky Halloween podcast for terrifying tales of creeping malware, ectoplasmic entitlements, and voracious vulnerabilities...

    Is Cybercrime the Mafia of the 21st Century?

    In this exclusive podcast IBM Executive Security Advisor Limor Kessem discusses some of the top fraud threats facing enterprises, including ransomware.

    A Look at Today’s Cybercrime Threats in Asia-Pacific and Beyond

    In this podcast IBM Security experts Etay Maor and Tal Darsan discuss current cybercrime threats and trends, with a special emphasis placed on Asia-Pacific.

    You Don’t Have to Outrun the Bear: Data Security Insights from a Health Care Insider

    In this podcast, Michael Ash shares data security insights and actionable advice on how health care organizations can face their PHI protection challenges.