Endpoint May 17, 2017 Lessons learned from the WannaCry Ransomware attack and many others that preceded it 3 min read - The best strategy to defend against the WannaCry ransomware attack and similar events is to adopt tools to prevent them from occurring in the first place.
May 16, 2017 Protect Against the WannaCry Ransomware Attack With IBM X-Force Threat Intelligence With QRadar 4 min read - Organizations affected by the WannaCry ransomware attack can leverage IBM X-Force Threat Intelligence with QRadar to mitigate this unprecedented threat.
Intelligence & Analytics May 12, 2017 More Than Meets the Eye: Five Common Misunderstandings About SIEM Solutions 2 min read - SIEM solutions are not meant to prevent security breaches. Rather, they are designed to strengthen the organization's overall security posture.
Incident Response May 8, 2017 Five Whys: Lessons From the World of Incident Investigations 3 min read - Cybersecurity is all about asking the right questions. The Five Whys method can help analysts prevent near misses from becoming full-blown incidents.
Intelligence & Analytics May 5, 2017 Threat Intelligence in the Age of Cyber Warfare 3 min read - In the age of cyber warfare, security analysts must determine which assets are most critical and prioritize their defense strategies accordingly.
Application Security April 25, 2017 The Apache Struts 2 Vulnerability and the Importance of Patch Management 4 min read - The disclosure of an Apache Struts 2 vulnerability made the framework a lucrative target and highlighted the importance of patch management.
Risk Management April 11, 2017 Architectures for Securing IT Systems 5 min read - IT analysts can refer to the human immune system as a model for securing IT systems through careful vetting of data and prioritization of threats.
Risk Management April 6, 2017 Can Cyber Situational Awareness Prevent the Next Black Swan Cyber Event? 4 min read - Security analysts cannot predict black swan events, but they can estimate the likelihood of a damaging breach through cyber situational awareness.
CISO April 5, 2017 Signs That You’re About to Suffer a Security Breach 2 min read - Security leaders must communicate effectively with executives and monitor users for signs that the organization is about to suffer a security breach.
Risk Management March 28, 2017 Simplifying Risk Management 5 min read - To properly manage risk, security analysts must understand the threats and vulnerabilities that exist on their networks and assess their consequences.