Threat Hunting August 7, 2017 Threat Hunting Services Are Now a Basic Necessity 4 min read - EDR solutions enable threat hunting teams to fine-tune behavioral detection rules and determine the techniques by which malware spreads through a network.
Artificial Intelligence July 18, 2017 Responsive Machine Learning: The Necessary Evolution of Endpoint Security 4 min read - With responsive machine learning, analysts can create robust training sets by combining thousands of malware samples with current data on software updates.
Network June 27, 2017 Execute Your IoT Deployment by the Book 2 min read - More connected devices means a larger threat surface. That's why it's critical to prioritize security when designing your IoT deployment.
Endpoint June 22, 2017 Health Care Endpoint Hygiene: A Post-WannaCry Call to Action < 1 min read - The idea of employing basic endpoint hygiene to keep your data safe seems like a no-brainer. So why was the WannaCry ransomware attack so damaging?
Intelligence & Analytics June 8, 2017 Securing Your Enterprise Assets While Traveling for Work 3 min read - It is critical to ensure that the right policies and controls are in place to help defend enterprise assets before a business trip, on the go and at home.
June 1, 2017 Chipotle Data Breach Investigation Shows Fraudsters Aimed at Endpoints 2 min read - Chipotle released the results of an internal investigation that revealed poor endpoint security and maintainance was to blame for a data breach.
Endpoint May 19, 2017 Unapplied Knowledge: Using Endpoint Intelligence to Earn an A-Plus in Security 3 min read - Security professionals can now add the previously unapplied knowledge from IBM BigFix to the existing set of data available through QRadar.
Endpoint May 11, 2017 The Road to 2020, Part II: Transforming Your Enterprise With IoT 5 min read - To protect sensitive data from emerging threats associated with the rise of the IoT, security analysts must adopt a centralized approach to UEM.
Intelligence & Analytics May 10, 2017 Vulnerability Management in the Age of Analytics 2 min read - An effective vulnerability management strategy requires continuous visibility into endpoint activity and real-time control over devices in a network.
May 8, 2017 Expert Advice from CBI: Securing Your Endpoint Landscape 2 min read - IBM BigFix Detect includes new features to help organizations bolster their endpoint management strategies and prevent high-profile data breaches.