April 17, 2018 By Michelle J. Rivers 2 min read

Technology is everywhere. We cannot escape it — but would we really want to?

For the most part, technology makes our lives so much easier. Our refrigerators tell us when we’re out of milk, our watches tell us when we need to be more active and our vehicles give us directions. Software on our phones allows us to shop for just about anything, check our heart rate, stay active on news and social media, and even check our kids’ grades.

Technology has also given many people the opportunity to work from anywhere that has an internet connection. Nowadays, many professionals don’t even need a laptop or computer for work — all they have to do is tap an app on a smartphone or tablet.

According to Hacker Noon, the average adult spends almost four hours on his or her phone daily. Almost all of that time — approximately 90 percent — is spent using apps. This increase in internet usage has expanded the threat surface. With all this technology in our personal and professional lives, cybersecurity should be top of mind for everyone — especially those responsible for protecting their company’s networks.

A New MSS App For Security Professionals

At the same time, news of cyberattacks and data breaches has become commonplace. In this environment, the security industry must stay ahead of threats to protect clients and make client interactions timely and easily accessible.

Imagine that your managed security services provider (MSSP) is working on an active threat and needs to alert you. Typically, it would send an alert through a ticketing system or email. Depending on the severity, it may call you directly. But are these standard means of communication effective in the face of an ongoing attack? Cybercriminals don’t keep bankers’ hours, and clients are not always glued to their desks. System alerts or emails can go unaddressed for hours.

MSSPs must meet their clients where they are — and these days that means on their smartphones. That’s why IBM Security Services developed an app for security professionals that allows users to conveniently assess the latest happenings in the world of cybersecurity intelligence, news and even the current state of their security environment.

For IBM X-Force Threat Management clients, the information is aligned to the National Institute of Standards and Technology (NIST) Cybersecurity Framework, providing:

  • Insight into assets and their related vulnerabilities;
  • Robust threat prevention security policies and procedures for users and systems;
  • Rapid and accurate threat detection;
  • Clearly defined response techniques for cybersecurity threats; and
  • Recovery plans that allow for quick restoration of systems affected by cybersecurity incidents.

For those who prefer to chat, Watson technology is embedded into the app to answer security-related questions.

Looking Ahead

Very soon, the IBM app for security professionals will enable clients to submit and update cases. This information will be available in the news stream. Users will also be able to view reports based on threat activity, investigations and other factors. Now, while our clients are on their phones ordering dinner or checking the stock market, they can also monitor security activity for their organization and stay ahead of threats.

To see for yourself, download the app now, available for Android and iOS users.

More from Security Services

Pentesting vs. Pentesting as a Service: Which is better?

5 min read - In today's quickly evolving cybersecurity landscape, organizations constantly seek the most effective ways to secure their digital assets. Penetration testing (pentesting) has emerged as a leading solution for identifying potential system vulnerabilities while closing security gaps that can lead to an attack. At the same time, a newer entrant into the security arena is Pentesting as a Service (PTaaS). Although PTaaS shares some similarities with pentesting, distinct differences make them two separate solutions. This article will discuss how these methodologies…

How I got started: Attack surface management

4 min read - As the threat landscape multiplies in sophistication and complexity, new roles in cybersecurity are presenting themselves more frequently than ever before. For example, attack surface management. These cybersecurity professionals are responsible for identifying, mapping and securing all external digital assets an organization owns or is connected to. This includes servers, domains, cloud assets and any other digital points that could be exploited by cyber criminals. Their role involves continuously monitoring these assets for vulnerabilities, misconfigurations or other potential security risks…

X-Force uncovers global NetScaler Gateway credential harvesting campaign

6 min read - This post was made possible through the contributions of Bastien Lardy, Sebastiano Marinaccio and Ruben Castillo. In September of 2023, X-Force uncovered a campaign where attackers were exploiting the vulnerability identified in CVE-2023-3519 to attack unpatched NetScaler Gateways to insert a malicious script into the HTML content of the authentication web page to capture user credentials. The campaign is another example of increased interest from cyber criminals in credentials. The 2023 X-Force cloud threat report found that 67% of cloud-related…

Does your security program suffer from piecemeal detection and response?

4 min read - Piecemeal Detection and Response (PDR) can manifest in various ways. The most common symptoms of PDR include: Multiple security information and event management (SIEM) tools (e.g., one on-premise and one in the cloud) Spending too much time or energy on integrating detection systems An underperforming security orchestration, automation and response (SOAR) system Only capable of taking automated responses on the endpoint Anomaly detection in silos (e.g., network separate from identity) If any of these symptoms resonate with your organization, it's…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today