X-Force August 24, 2015 Anonymity and Cryptocurrencies Enabling High-Stakes Extortion 3 min read - The third 2015 IBM X-Force Threat Intelligence Quarterly has been released, detailing the evolution of ransomware, anonymous routers and more.
Advanced Threats August 6, 2015 Are These Airline Hacks Related? 3 min read - Several confirmed or suspected hacks of major airlines wreaked havoc on global travelers, but were there more to these attacks than meets the eye?
X-Force July 17, 2015 A Gentle Introduction to the X-Force Exchange API 10 min read - The X-Force Exchange API offers a host of capabilities that can increase threat intelligence and information sharing among users.
Threat Intelligence May 19, 2015 Perimeter Protection Is Not Enough 3 min read - IBM X-Force Exchange is giving organizations a safe, anonymous way to share intelligence to move beyond simple perimeter protection.
Intelligence & Analytics May 14, 2015 Information Sharing Is Key to Managing Cyber Risks 2 min read - The need to foster sharing of cyberthreat data and security intelligence among businesses and other organizations is more pressing than ever.
X-Force May 14, 2015 From the Dark Web to Your Data: Uncovering the Life of a Cyberthreat With Community Knowledge 2 min read - IBM's X-Force Exchange emphasizes collaboration and intelligence sharing, using strategies used in the Dark Web to promote security and defeat criminals.
X-Force May 11, 2015 Crowdsourcing Security: Will the White Hat or Black Hat Win? 3 min read - To win the war against black hat developers, white hats must collaborate with each other and their customers to share threat intelligence.
Intelligence & Analytics May 7, 2015 Threat Intelligence Collaboration Leads to More Efficient, Comprehensive Cybersecurity 8 min read - Multilayered exchanges focused on shared threat intelligence can work to identify, stop and prevent security attacks, limiting the resulting damage.
Malware May 4, 2015 Malware Patient Zeros: How Threat Intelligence and Herd Immunity Can Help Prevent the Spread of Infections 4 min read - Organizations can borrow lessons from the medical industry and use herd immunity and information sharing to stop the spread of malware.
X-Force April 27, 2015 Threat Intelligence Sharing: The First Steps 2 min read - Threat intelligence sharing is gaining acceptance and momentum in the security community. Here are a few suggestions to get started on the right foot.