Fraud Protection September 18, 2017 Raise the Red Flag: Guidelines for Consuming and Verifying Indicators of Compromise 7 min read - Before sharing indicators of compromise, analysts must consider the sensitivity of the data and verify the identities of the senders and receivers.
Intelligence & Analytics April 19, 2017 Surfing the Tsunami of Threat Data With Cognitive Security 2 min read - Nowadays, most organizations' networks are under constant attack. Cognitive security is the key to locating IoCs within the tsunami of threat intelligence.
Intelligence & Analytics September 13, 2016 Threat Intelligence: Is Your Current Capability Comprehensive? 2 min read - While many threat intelligence capabilities focus on delivering information to lower-tier analysts, an effective solution extends right up to the CISO.
Threat Research December 2, 2015 Practical Indicators of Compromise and X-Force Exchange 8 min read - IBM's X-Force Exchange is a threat intelligence platform that facilitates information sharing and research surrounding indicators of compromise.
Threat Research November 17, 2015 A Look Back With IBM X-Force: Lessons Learned From Security Research in 2015 2 min read - The latest 2015 IBM X-Force Threat Intelligence Quarterly focuses on the lessons learned from security research throughout the year.
Intelligence & Analytics July 1, 2015 Hidden Warnings: A Look at Indicators of Compromise (IoC) 2 min read - Modern techniques and tools can assist security professionals with digging in and identifying the key indicators of compromise (IoC) on a network.