The IBM X-Force Exchange includes an email inbox feature that cuts down on information overload and enables analysts to easily share threat intelligence.
Threat intelligence exchanges enable companies to detect and respond to incidents more effectively, but only if they take the necessary steps to prepare.
GootKit is an ongoing malware project that affects the three most popular browsers: Internet Explorer, Mozilla Firefox and Google Chrome.
At InterConnect 2017, experts will demonstrate how IBM is applying Watson for Cyber Security to take threat intelligence to the next level.
Security intelligence analysts must know the three elements of cybersecurity — threat intelligence, event intelligence and enrichment — to thwart threats.
IBM X-Force researchers discovered that an upgraded version of Dridex has been using a new injection method, signifying the Trojan's continued evolution.
A cybersecurity immune system can "inoculate" your organization against attacks by ingesting and using the latest threat intelligence.
The power of Watson and cognitive computing enables security operations center specialists to defend their environments against threats with confidence.
To effectively share threat intelligence, security professionals must develop processes, resources and trust relationships with other industry players.
For the first time, IBM X-Force Researchers reported Zeus Sphinx activity targeting banks and financial institutions in Canada and Australia.