When it comes to defending an organization against cyberattacks and their aftershocks, the best way to shore up incident response is to practice.
IBM X-Force IRIS combines incident response with threat intelligence to help organizations analyze cybercriminals' behavior and predict future trends.
Further analysis of impacted Petya ransomware victims led our team to conclude that this attack was specifically aimed at organizations within Ukraine.
It appears that the current Petya payload is being distributed using the same exploits that were part of the leaks that powered the spread of WannaCry.
IBM X-Force attributed a recent wave of malware-induced Active Directory (AD) lockouts across several IR engagements to the operators of the QakBot Trojan.
OODA loops can help System 1-thinking security professionals react swiftly to cyberattacks and embrace an intuitive approach to incident response.
An effective backup strategy is simply one part of a larger security and incident response plan, which should be developed proactively.
A planned, communicated, rehearsed and organizationally tailored incident management program is central to an effective security strategy.
The "Ransomware Response Guide" can help your organization prepare for preventing this common threat or validate your existing security policies.
Strategic relationships may be an organization's principal source for obtaining essential artifacts in incident response investigations.