This year, IDC recognized IBM X-Force Incident Response and Intelligence Services (IRIS) for effectively streamlining incident response (IR) for customers around the globe.
Dwell times for data compromises are still shockingly high. Understand how to detect a breach in your network to improve response and mitigation time.
The U.S. Fire Administration's five key components of a fire safety education program serve as a useful framework for CISOs looking to boost their company's ability to respond to a cyber emergency.
Despite the rising cost of a data breach, many organizations still believe they don't need cybersecurity insurance.
The volume of CVE data is rapidly growing, and security teams need continuous visibility into their assets and associated risks to stay on top of emerging threats.
Insider threats are not only the most common cause of cybersecurity risk, but also the costliest and hardest to detect.
Ten years ago, John Clarke was driving a van in Ireland for a living. Today, he develops games at IBM to help train security professionals on incident response and cyber situational awareness.
Data classification takes on even greater importance today in the context of regulatory compliance mandates and debates over data privacy. Here's what you need to know.
Your business can avoid a data breach by using self-assessment tools to plan your cybersecurity approach. Doing so empowers you to focus on making the headlines with good news. Here's how.
With GDPR in full swing, organizations need to prepare their incident response plans to move swiftly in the event of a breach and meet the mandated 72-hour incident disclosure window.