200 Posts

Security Intelligence Staff

Security Intelligence Staff

    Security Intelligence strives to be the leading site for technical and business-focused security content. Security is an essential factor for every business, and we want to help you adapt to and safeguard against its ever-changing landscape.

    Written By Security Intelligence Staff

    Digital Dating Safety

    As more people utilize mobile dating applications to find companionship, the apps have become more attractive to potential attackers. IBM Security’s research found that over 60 percent of the leading dating apps studied are vulnerable to medium...

    Stepping Up the Battle Against Advanced Threats

    The Three Lost Battles Over the years, organizations have employed various tools and techniques to block cyber-attacks and prevent attackers from gaining access into the enterprise network. Traditional methods such as 1) user education, 2)...

    Java Under Attack

    Java applications can expose organizations to significant risk, as Java is one of the most targeted software platforms. According to research conducted by IBM Security Trusteer researchers and IBM X-Force, 50% of exploits target Java...

    eBook: Stopping Zero Day Exploits for Dummies

    Cyber attacks are growing every day and become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you discover the zero-day exploits and threats used to compromise your...

    IBM X-Force Threat Intelligence Quarterly – 4Q 2014

    The IBM X-Force report looks at today’s security risks – from new threats arising within the Internet of Things, to the sources of malware and botnet infections.

    IBM X-Force Threat Intelligence Quarterly – 3Q 2014

    This quarterly report from the IBM X-Force research and development team looks closely at at Heartbleed—from the latest attack activity to mitigation strategies - based on the latest data and ongoing analysis.

    How to Protect Our Digital World from Cyber Attacks

    A security officer has to be right all the time, the hacker has to be right once. Cybercriminals continuously target financial institutions, enterprises, eCommerce sites and other organizations to steal money and valuable business information.

    How Cyber Attackers Operate and How to Stop Them

    Video on how attackers operate, how they can be stopped, and how security enables organizations to take advantage of cloud, mobile and social technologies.

    The Risks of Freedom: Enterprise Security, Identity and Access Management and the Mobile Device

    An employee's use of mobile devices can jeopardize a company's security, especially in the area of identity and access management.

    137 Security Questions Every Leader Should Ask

    In a world where a week rarely goes by without reports of at least one serious cyber attack against a major organization, it’s important for business leaders to always be asking the right security questions. We put together a list of 137 security...