CISO June 6, 2017 Avoiding Security Hype, the Hazard From Hollywood 2 min read - Unfortunately, the Hollywood approach of security hype doesn't do much to help organizations improve their actual security.
April 20, 2017 Vigilante White-Hat Hacker Boosts IoT Device Security 2 min read - Hajime appears to have been created by a vigilante that is attempting to improve IoT device security and help IT decision-makers tighten defenses.
Identity & Access March 17, 2017 Your Cybercriminal Has an Image Problem 2 min read - The classic image of the Hollywood hacker is misleading. The typical cybercriminal is more likely to be a state-sponsored actor or malicious insider.
November 1, 2016 White-Hat Hackers Blacklisted? New DMCA Exemptions Protect the Good Guys 2 min read - Companies have a vested interest when it comes to ferreting out IT problems before cybercriminals manage to launch attacks in the wild. The recent Mirai infections are proof positive that compromised Internet of Things (IoT) devices paved the way for…
September 13, 2016 Portable Problems? New Vulnerability Report Sparks Hacker Hunt 2 min read - A vulnerability report is designed to alert vendors of potential security issues, but it can also help cybercriminals identify weak spots to attack.
X-Force July 13, 2016 Hacking the Connected Building: Real-Life ‘Mr. Robot’ 2 min read - The second season of "Mr. Robot" could focus on IoT and hacking a connected building, just like the IBM X-Force team was able to do in real life.
X-Force August 25, 2015 The Myth of the Omnipotent Hacker 3 min read - The way movies and television shows portray a hacker is far off from reality. In today's collaborative world, attackers are often working in crime rings.
March 25, 2015 All Four Major Browsers Hacked in Pwn2Own Competition 3 min read - All four major browsers were hacked by security researchers at the Pwn2Own competition, which is designed to encourage responsible bug disclosures.
Data Protection October 24, 2014 Hackers for Hire in the Cybersecurity Business: Are You Ready for a Security Breach? 2 min read - When crafting your organization's cybersecurity plans, consider hiring an ethical hacker to find the vulnerabilities in your system.
Intelligence & Analytics October 10, 2014 Cybersecurity: Learn to Think Like the Enemy 2 min read - The only way to really test your organization's cybersecurity measures is to attack them — which means learning to think like a black-hat hacker.