Technology is everywhere. We cannot escape it — but would we really want to?

For the most part, technology makes our lives so much easier. Our refrigerators tell us when we’re out of milk, our watches tell us when we need to be more active and our vehicles give us directions. Software on our phones allows us to shop for just about anything, check our heart rate, stay active on news and social media, and even check our kids’ grades.

Technology has also given many people the opportunity to work from anywhere that has an internet connection. Nowadays, many professionals don’t even need a laptop or computer for work — all they have to do is tap an app on a smartphone or tablet.

According to Hacker Noon, the average adult spends almost four hours on his or her phone daily. Almost all of that time — approximately 90 percent — is spent using apps. This increase in internet usage has expanded the threat surface. With all this technology in our personal and professional lives, cybersecurity should be top of mind for everyone — especially those responsible for protecting their company’s networks.

A New MSS App For Security Professionals

At the same time, news of cyberattacks and data breaches has become commonplace. In this environment, the security industry must stay ahead of threats to protect clients and make client interactions timely and easily accessible.

Imagine that your managed security services provider (MSSP) is working on an active threat and needs to alert you. Typically, it would send an alert through a ticketing system or email. Depending on the severity, it may call you directly. But are these standard means of communication effective in the face of an ongoing attack? Cybercriminals don’t keep bankers’ hours, and clients are not always glued to their desks. System alerts or emails can go unaddressed for hours.

MSSPs must meet their clients where they are — and these days that means on their smartphones. That’s why IBM Security Services developed an app for security professionals that allows users to conveniently assess the latest happenings in the world of cybersecurity intelligence, news and even the current state of their security environment.

For IBM X-Force Threat Management clients, the information is aligned to the National Institute of Standards and Technology (NIST) Cybersecurity Framework, providing:

  • Insight into assets and their related vulnerabilities;
  • Robust threat prevention security policies and procedures for users and systems;
  • Rapid and accurate threat detection;
  • Clearly defined response techniques for cybersecurity threats; and
  • Recovery plans that allow for quick restoration of systems affected by cybersecurity incidents.

For those who prefer to chat, Watson technology is embedded into the app to answer security-related questions.

Looking Ahead

Very soon, the IBM app for security professionals will enable clients to submit and update cases. This information will be available in the news stream. Users will also be able to view reports based on threat activity, investigations and other factors. Now, while our clients are on their phones ordering dinner or checking the stock market, they can also monitor security activity for their organization and stay ahead of threats.

To see for yourself, download the app now, available for Android and iOS users.

more from Security Services

To Cybersecurity Incident Responders Holding the Digital Front Line, We Salute You

Over the course of two decades, I’ve seen Incident Response (IR) take on many forms. Cybercrime’s evolution has pulled the nature of IR along with it — shifts in cybercriminals’ tactics and motives have been constant. Even the cybercriminal psyche has completely rebirthed, with more collaboration amongst gangs and fully established ransomware enterprises running. When I was first starting off,…

CISA Certification: What You Need to Know

The globally-recognized Certified Information Systems Auditor (CISA) certification shows knowledge of IT and auditing, security, governance, control and assurance to assess potential threats. As you can imagine, it’s very much in demand. It can also be confusing.  Is CISA Certification Related to the Cybersecurity and Infrastructure Security Agency? CISA, the certification, is related to CISA, the federal agency, right?  Wrong.…

Raspberry Robin and Dridex: Two Birds of a Feather

IBM Security Managed Detection and Response (MDR) observations coupled with IBM Security X-Force malware research sheds additional light on the mysterious objectives of the operators behind the Raspberry Robin worm. Based on a comparative analysis between a downloaded Raspberry Robin DLL and a Dridex malware loader, the results show that they are similar in structure and functionality. Thus, IBM Security…