As a young girl in Romania, Irina Nicolae was fascinated with machinery and how different parts fit together. Today, she conducts AI research to develop ways to protect this technology from threats.
IBMer Mike Barcomb draws upon his experience in the U.S. Army Reserve to lead a team of incident response experts through careful planning, regular rehearsals and quick decision-making.
Topics of discussion at this year's Black Hat conference included the Internet of Things (IoT) in smart cities, the latest advancements in vulnerability management and more.
The lifecycle management of indicators is an important element to support decisions and actions against attackers. This process informs the courses of action matrix to build a response plan.
Data classification takes on even greater importance today in the context of regulatory compliance mandates and debates over data privacy. Here's what you need to know.
The International Standards Organization (ISO) recently released an updated version of its security risk-management guidelines, ISO/IEC 27005:2018. Here are the key lessons.
To build a successful threat hunting program, you must thoroughly understand who might attack your organization, what these malicious actors might be after and what tactics they'll use to get it.