Intelligence & Analytics July 23, 2018 How Pivoting Can Help Your Incident Response Process 6 min read - Indicators of compromise are key data points used during an incident response process. Regularly testing the reliability of your indicators can make all the difference in your IT security process.
Fraud Protection September 18, 2017 Raise the Red Flag: Guidelines for Consuming and Verifying Indicators of Compromise 7 min read - Before sharing indicators of compromise, analysts must consider the sensitivity of the data and verify the identities of the senders and receivers.
Intelligence & Analytics April 19, 2017 Surfing the Tsunami of Threat Data With Cognitive Security 2 min read - Nowadays, most organizations' networks are under constant attack. Cognitive security is the key to locating IoCs within the tsunami of threat intelligence.
Intelligence & Analytics September 13, 2016 Threat Intelligence: Is Your Current Capability Comprehensive? 2 min read - While many threat intelligence capabilities focus on delivering information to lower-tier analysts, an effective solution extends right up to the CISO.
X-Force December 2, 2015 Practical Indicators of Compromise and X-Force Exchange 8 min read - IBM's X-Force Exchange is a threat intelligence platform that facilitates information sharing and research surrounding indicators of compromise.
X-Force November 17, 2015 A Look Back With IBM X-Force: Lessons Learned From Security Research in 2015 2 min read - The latest 2015 IBM X-Force Threat Intelligence Quarterly focuses on the lessons learned from security research throughout the year.
Intelligence & Analytics July 1, 2015 Hidden Warnings: A Look at Indicators of Compromise (IoC) 2 min read - Modern techniques and tools can assist security professionals with digging in and identifying the key indicators of compromise (IoC) on a network.