130 Posts

Security Intelligence Staff

Security Intelligence Staff

Security Intelligence strives to be the leading site for technical and business-focused security content. Security is an essential factor for every business, and we want to help you adapt to and safeguard against its ever-changing landscape.

Written By Security Intelligence Staff

Connecting the Dots With the IBM Cognitive SOC and Watson for Cyber Security

With IBM's Cognitive SOC and Watson for Cyber Security, analysts can detect and respond to incidents that traditional threat intelligence platforms miss.

The Future and Present of IoT Security

IBM's Charles Henderson discusses the future and present of IoT Security, based on his recent research of connected cars and home automation devices.

What Makes IBM Watson the Whole Package

In this exclusive podcast series, “Take Back Control of Your Cybersecurity Now,” Paul Ferrillo and Christophe Veltsos share insights from their recently released book of the same name. By explaining top threats and cyber risks in plain language,...

Before, During and After an Attack

To succeed in a highly contested space, organizations must have comprehensive, robust and holistic security and threat intelligence capabilities. As criminals and their methodologies become increasingly sophisticated — better organized,...

Investigating Threats with Watson for Cyber Security

Enterprise security operations centers (SOCs) are being crushed under the burden of an estimated 200,000 events per day, according to IBM research. And while that’s a lot of events, what complicates matters even further is that only a tiny...

Leverage Ponemon’s Application Security Risk Management Study to Jump-Start Your AppSec Program

Without an effective application security testing program in place, detecting and resolving vulnerabilities can prove to be a “guessing game” for your organization. Unfortunately, it’s a dangerous guessing game: Placing your bet on the wrong...

The Cognitive Transformation is for Everyone

In this exclusive podcast series, “Take Back Control of Your Cybersecurity Now,” Paul Ferrillo and Christophe Veltsos share insights from their recently released book of the same name. By explaining top threats and cyber risks in plain language,...

CISOs, Tell It Like It Is – But in English

In this exclusive podcast series, “Take Back Control of Your Cybersecurity Now,” Paul Ferrillo and Christophe Veltsos share insights from their recently released book of the same name. By explaining top threats and cyber risks in plain...

IBM X-Force Research: Security Trends in the Health Care Industry

Read the IBM X-Force Report on security trends in the health care industry to learn why attackers focus on health care organizations and how the industry can strengthen its defenses.

Directors Are From Mars, CISOs Are From Venus

In this exclusive podcast series, “Take Back Control of Your Cybersecurity Now,” Paul Ferrillo and Christophe Veltsos share insights from their recently released book of the same name. By explaining top threats and cyber risks in plain...