207 Posts

Security Intelligence Staff

Security Intelligence Staff

    Security Intelligence strives to be the leading site for technical and business-focused security content. Security is an essential factor for every business, and we want to help you adapt to and safeguard against its ever-changing landscape.

    Written By Security Intelligence Staff

    IBM X-Force Research: Beware of Older Cyber Attacks

    Although they are often eclipsed by new and emerging threats, two attack patterns that date back to 1969 — footprinting and brute force attacks — remain widely used by attackers around the world. Because the IoT devices and industrial control...

    IBM Unveils Enhancements to Its Mobile Productivity Tools and Data Protection Controls

    MaaS360's latest enhancements include a major redesign of the user experience and tighter integration with security tools for greater mobile productivity.

    Solve the Case with Identity Governance and Intelligence

    In the age of the Insider Threat, you can never be too careful with who has access to what. Whether from malicious insiders or inadvertent actors, it is critical that organizations ensure proper access and governance.

    IBM X-Force Research: The Inside Story on Botnets

    Botnets have plagued us for almost two decades now. Named by combining the words “robot” and “network,” a botnet is a network of computers infected with malicious software and remotely commanded and controlled by cybercriminals we call...

    Don’t Drown in a Sea of Vulnerabilities

    Organizations are under increasing pressure to prevent security breaches by sophisticated teams that seek to steal sensitive data or other proprietary information—attacks that potentially put the organization, its employees or its customers at...

    IBM X-Force Research: Outdated Encryption Standards Pose a Serious Risk of Data Breach

    Many businesses today depend upon encryption standards that date back to the late 1990s. These standards are now considered insufficient for protecting sensitive, confidential or private data, according to the National Institute of Standards and...

    Under the Radar: How to Protect Against the Insider Threat

    Organizations must combat the risk of an insider threat with access controls, management and monitoring for privileged accounts.

    Locky Sends You an Invoice and Makes You Pay

    The recently discovered Locky ransomware encrypts data using AES encryption and then demands hundreds of dollars. Here's what you need to know.

    Decrypt the Secrets to Success at InfoSec World 2016

    With over 70 planned talks, InfoSec World 2016 promises to pack a punch in terms of actionable advice and words of wisdom for security professionals.

    Who’s the Weakest Link When It Comes to Mobile Banking Fraud? We Are

    Mobile banking is becoming more prevalent, so the onus is on banks and financial institutions to secure all user sessions and endpoints to prevent fraud.