155 Posts

Security Intelligence Staff

Security Intelligence Staff

Security Intelligence strives to be the leading site for technical and business-focused security content. Security is an essential factor for every business, and we want to help you adapt to and safeguard against its ever-changing landscape.

Written By Security Intelligence Staff

IBM X-Force Research: Weaponizing the Internet of Things

It is widely known that cybercriminals are populating botnets with easily exploitable Internet of Things (IoT) devices such as security cameras, webcams and DVRs. With the proliferation of IoT devices accelerating significantly — expected to...

IBM X-Force Research: Cybercrime Riding Tax Season Tides

Cybercrime is a year-round profession, but there’s no question that fraudsters take advantage of seasonal events such as gift-giving season in the winter and tax filing deadlines in the spring. The most common fraud types that ensue this time...

IoT Security Fact #3: Shared Secrets Do Not Remain Secret

This episode of the IBM podcast series, "Five Indisputable Facts about IoT Security," looks at IoT Security Fact #3: Shared secrets do not remain secret.

Monitored Security is Superior Security

Organizations around the globe suffered a record number of security leaks and attacks in 2016. Quite remarkably, the average IBM-monitored security client actually experienced fewer attacks compared to the previous year, down 12 percent. Yet this...

2016: The Year Menaces Multiplied

IBM X-Force research has uncovered some startling facts about the cyberthreat landscape in 2016 — from record-busting breaches to unprecedented vulnerability disclosures and attacks. Indeed, the security landscape in 2016 was rocked with over 4...

IBM X-Force Threat Intelligence Index 2017

2016 was a year in which “more was more” in the security world. From larger-than-life data breaches with over 4 billion records leaked to record numbers of DDoS attacks, vulnerability disclosures, ransomware and spam, it seems no digital...

IoT Security Fact #2: Software Security Will Degrade Over Time

This episode of the IBM podcast series, "Five Indisputable Facts about IoT Security," looks at IoT Security Fact #2: Software security will degrade over time.

The Retail Industry and the Challenges of Enterprise Mobility Management

MaaS360 provides IT managers in the retail industry with all the enterprise mobility management tools they need to control remote access to corporate data.

IoT Security Fact #1: Devices Will Operate in Hostile Environments

This episode of the IBM podcast series, "Five Indisputable Facts about IoT Security," looks at IoT Security Fact #1: Devices will operate in hostile environments.

Transform Your SOC with Managed Services Using Carbon Black and QRadar

Carbon Black is a leader in next-generation endpoint security, and its products are initiating an evolution in SOC process and procedure.