Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights Services.

I recently sat down with Kevin Albano, Associate Partner with IBM X-Force, to learn more about this new managed services offering.

Tell us how IBM X-Force Cyber Exposure Insights Services works?

Albano: With IBM X-Force Cyber Exposure Insights Services, the team first holds a kickoff meeting with the client to learn what matters most to the organization and about their external digital risks.  We also ask about keywords and key phrases that expose their organization, such as domain names, IP blocks and email addresses. Next, we begin basic monitoring for potential external threats. If there’s an instance of a fraudulent website or a brand impersonation then we can work with providers to take down the impersonation sites, which protects the organization’s brand reputation.

We started this service over a year ago in the Americas and Europe. Now, we are offering this service more consistently and are excited to amplify the successes we’ve already seen.

Can you share an example of how IBM X-Force Cyber Exposure Insights Services protected an organization?

Albano: With one organization we protect, we identified a fraudulent website before there was an attempt at fraud and had it taken down. Because we were looking for websites that were like our client’s official website, we detected threat actors creating the domain and hosting URL. We then contacted the domain register and hosting provider before the threat actors launched the website.

Discover Cyber Exposure Insights

How do clients benefit from using IBM X-Force Cyber Exposure Insights Services?

Albano: One of the biggest benefits that our customers tell us about after using our services is that they have assurance that their data and their client’s data is protected. We also see that our clients see a reduction in the number of notifications of credential issues or fraudulent websites because we are proactively resolving issues. When they know about a potential issue ahead of time, the company can manage identity and access controls in a more internal way.

Resources are always a big challenge with cybersecurity. How does IBM X-Force Cyber Exposure Insights Services help with resource management?

Albano: Before using IBM X-Force Cyber Exposure Insights Services, our clients typically used a portal to update keywords and manage notifications, which takes a lot of time and resources. With IBM X-Force Cyber Exposure Insights Services managing the indications of the keywords, our clients are able to use those resources in other ways.

Through monthly meetings, we go over all keywords and operations review practices to make sure that our efforts are best protecting the client’s environment. Our team works with both sides of the business — business and technical — to help the organizations understand both the cybersecurity and business perspective which helps us better protect their brand.

Do you have any other thoughts to share on your team’s managed services offerings?

Albano: As an organization and even as individuals, we have to manage our online risk and exposure. More than ever today, as both a society and a community we have to be conscious of what we put online. Each of us needs to realize how others can use data and information both for good and malicious.

To learn how IBM X-Force can help you with anything regarding cybersecurity including incident response, threat intelligence, or offensive security services schedule a meeting here.

If you are experiencing cybersecurity issues or an incident, contact X-Force to help: US hotline 1-888-241-9812 | Global hotline (+001) 312-212-8034.

More from Intelligence & Analytics

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Web injections are back on the rise: 40+ banks affected by new malware campaign

8 min read - Web injections, a favored technique employed by various banking trojans, have been a persistent threat in the realm of cyberattacks. These malicious injections enable cyber criminals to manipulate data exchanges between users and web browsers, potentially compromising sensitive information. In March 2023, security researchers at IBM Security Trusteer uncovered a new malware campaign using JavaScript web injections. This new campaign is widespread and particularly evasive, with historical indicators of compromise (IOCs) suggesting a possible connection to DanaBot — although we…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today