The IBM Security X-Force team offered some security predictions for new trends in the technology landscape and threats that are poised to emerge in 2018.
At IRISSCON 2017, 48 contestants across 12 teams battled it out in a free-for-all CTF competition to test their hacking, defending and forensics skills.
Following recent malware evolution, modern endpoint detection and response tools should not rely on just one trigger event, but on sophisticated logic.
When it comes to protecting the railroad industry from cyberthreats, the security immune system approach can reduce incident triage from months to minutes.
The passive Grasshopper should be more like the Ants, who use IBM Resilient to support their robust and comprehensive incident response plan.
The Emperor was the greatest CISO in the land. His castle was as safe as could be, and there were no insider threats to be found — or so he thought.
Investigative analysis tools enable SOC teams to proactively hunt for and mitigate cyberthreats instead of meticulously collecting and curating data.
To fight IoT crime, security professionals must properly classify incidents and connect seemingly disparate strings of evidence.
An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware.
In the wake of a data breach, organizations should strive to be as transparent and responsive as possible to rebuild customer trust.