According to recent research, privileged users and administrators represent the biggest insider threats to any organization's sensitive data.
Our prediction at the end of 2016 held true: The influx of advanced DDoS, POS and other attacks targeting the financial sector has yet to abate in 2017.
In manufacturing, security incidents occurred at a rate 40 percent higher than the average across all other industries in 2016, according to X-Force data.
Security intelligence solutions such as QRadar UBA enable analysts to detect potentially malicious activity on Microsoft Office 365 cloud-based apps.
IBM X-Force revealed that WannaCry spread to its targets like a computer worm. But unlike a classic worm, it carried a malicious payload of ransomware.
Security is often viewed as a technology problem, but many vulnerabilities can be traced back to flaws and inconsistencies in organizational behavior.
A health care data breach comes with big costs for companies, but records are going for just pennies on the Dark Web. Where is the disconnect?
Augmented and virtual reality can be invaluable tools for threat modeling in all sectors, but the emerging technologies also introduce new vulnerabilities.
The classic image of the Hollywood hacker is misleading. The typical cybercriminal is more likely to be a state-sponsored actor or malicious insider.
This five-step approach to securing critical data is the most effective way for organizations to protect their crown jewels from insider threats.