197 Posts

Security Intelligence Staff

Security Intelligence Staff

    Security Intelligence strives to be the leading site for technical and business-focused security content. Security is an essential factor for every business, and we want to help you adapt to and safeguard against its ever-changing landscape.

    Written By Security Intelligence Staff

    IDC White Paper: CISOs’ Guide to Enabling a Cloud Security Strategy – Focus on SaaS

    The forward thinking enterprise is already fully engaged in various cloud projects and applying controls in an ad hoc way. More importantly, even the most conservative organizations are likely to have unsanctioned cloud apps in use by their...

    Free E-Book: Integrated Threat Management For Dummies

    Every industry has been hit hard by hackers and cybercriminal organizations. If you don’t have the right measures in place to adequately prevent, detect, or respond to incidents, you could pay the price. Integrated Threat Management for Dummies,...

    IBM X-Force Research: Meet the Shifu Banking Trojan

    A brand new advanced banking Trojan discovered in the wild has been named “Shifu” by IBM X-Force research, after the Japanese word for ‘thief.’ The malware appears to have been active since as early as April 2015; it was unearthed by IBM...

    IBM X-Force Research: Security Attacks on Industrial Control Systems

    Our post-industrial societies reinvent themselves every day. Advances in the delivery of power and water systems may go unnoticed by the consumer, but over the past 25 years big industry has gradually embraced the digital age in the cause of making...

    Security Awareness Is Our Shared Responsibility

    During National Cyber Security Awareness Month, organizations should do their part to raise security awareness among employees and enforce best practices.

    Cloud Application Discovery, SSO, and Policy Enforcement Lets IT Security Say Yes to Cloud Apps

    Today’s security teams are confronting new risks with cloud adoption, cloud application security and cloud enforcement. Employees have to be monitored, and compliance must be ensured throughout the organization. Now, thanks to IBM Cloud...

    IBM X-Force Threat Intelligence Quarterly – 3Q 2015

    More than just a Hollywood trope, the Dark Web provides cover for nefarious individuals and organizations to launch anonymous attacks on corporate networks to exfiltrate valuable data. Attackers are targeting high-value communities and enterprises...

    Battling Security Threats from Within Your Organization

    It might be unpleasant or even taboo to refer to a company employee as a potential “threat,” but that’s the reality of the workplace today. How much damage could a disgruntled employee or ex-employee do to your organization? Find out what the...

    Temasek Polytechnic: Grooming Singapore’s Next Generation of Cybersecurity Professionals

    The TP-IBM SOC is ensuring qualified professionals are entering Singapore's cybersecurity workforce operationally ready from day one.

    IBM X-Force Research: Extortion by DDoS Attack

    Ransomware has received a lot of attention recently but an older threat, extortion by distributed denial of service (DDoS) attack, also demands our focus. By making servers or services unavailable, distributed denial of service (DDoS) attacks can be...