155 Posts

Security Intelligence Staff

Security Intelligence Staff

Security Intelligence strives to be the leading site for technical and business-focused security content. Security is an essential factor for every business, and we want to help you adapt to and safeguard against its ever-changing landscape.

Written By Security Intelligence Staff

IBM X-Force Research: Penetration Testing a Building Automation System

There is much focus in the IT industry on securing web servers, applications and critical network infrastructure from cyber attack, but what about the new class of web-enabled devices that are connected to the systems that control heating, lights...

IBM X-Force Research: Shining a Light on Blind SQL Injection

Weaknesses in default database installations can make your sensitive information vulnerable to SQL injection attacks. One such weakness, failure to perform input validation, has led to massive data breaches at large enterprises and small businesses...

IBM X-Force Research: Security Trends in the Manufacturing Industry

The manufacturing industry — including but not limited to automotive, electronics, textile and pharmaceutical companies — depends on production processes running at optimum efficiency to satisfy market demand. What happens when these processes...

Health Care Data Breaches: From Sidelines to Center Stage

Examine this infographic to learn how and why health care targets are rising to the top of the attackers’ target list.  

What We’re Thankful for This Holiday Season: Cybersecurity Edition

As the season of reflection and thanks is upon us, we here at Security Intelligence decided to ask what our contributors are thankful for this year.

IBM X-Force Threat Intelligence Quarterly – 4Q 2015

In the final issue of 2015, the IBM X-Force® Threat Intelligence Quarterly shifts the focus to our in-house experts at IBM Security Services. With its extensive global reach and experience addressing cyber security concerns and incidents affecting...

IBM X-Force Research: The Price of Loyalty Programs

A corporation’s customer service center is suddenly inundated with calls from customers who say they’ve received emails telling them their email addresses and passwords for their loyalty program accounts have been changed, even though they...

IDC White Paper: CISOs’ Guide to Enabling a Cloud Security Strategy – Focus on SaaS

The forward thinking enterprise is already fully engaged in various cloud projects and applying controls in an ad hoc way. More importantly, even the most conservative organizations are likely to have unsanctioned cloud apps in use by their...

Free E-Book: Integrated Threat Management For Dummies

Every industry has been hit hard by hackers and cybercriminal organizations. If you don’t have the right measures in place to adequately prevent, detect, or respond to incidents, you could pay the price. Integrated Threat Management for Dummies,...

IBM X-Force Research: Meet the Shifu Banking Trojan

A brand new advanced banking Trojan discovered in the wild has been named “Shifu” by IBM X-Force research, after the Japanese word for ‘thief.’ The malware appears to have been active since as early as April 2015; it was unearthed by IBM...