By adopting artificial intelligence solutions to help execute the MITRE ATT&CK framework, security teams can reduce dwell times, guide threat hunting endeavors and lighten the load of SOC analysts.
When he's not helping clients stay on top of cloud security, Andi Hudson is reaching out to schools to spread awareness about careers in technology and the importance of data privacy.
With modern mobile security challenges demanding a deeper level of visibility, policy and protection, organizations must invest in advanced unified endpoint management (UEM) solutions.
As you consider the various IT security events happening next year, here are five key reasons why you should attend some of the compelling IBM Security sessions planned at Think 2019.
How Security Consultant Ben Goodrich Uses Physics to Navigate the State of Constant Change in Cybersecurity
Just three years ago Ben Goodrich graduated with a degree in physics. Today he's a security consultant working with the world's biggest companies to provide an injection of cybersecurity expertise.
Today, we're announcing IBM Security Connect, an open, cloud-based platform that is capable of analyzing federated security data across unconnected tools and environments.
In its latest report for identity management and governance, Forrester recognized IBM Security as a Leader.
As a young girl in Romania, Irina Nicolae was fascinated with machinery and how different parts fit together. Today, she conducts AI research to develop ways to protect this technology from threats.
Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework.
DeepLocker has changed the game of malware evasion by taking a fundamentally different approach from any other current evasive and targeted malware. Here's what you need to know.