IBM X-Force monitored major data breach trends throughout 2017 and gleaned key insights to help companies avoid headline-grabbing security incidents.
There is no silver bullet to thwart the KRACK vulnerability, but a security intelligence platform can help analysts become security superheroes.
An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware.
A Belgian security researcher unearthed a massive WPA2 vulnerability that affects virtually all devices that connect to Wi-Fi networks.
The best way to remediate zero-day threats is to focus on proactively assessing and patching the vulnerabilities that facilitate them.
Enterprises and individual users should follow these six account protection tips not just during National Cyber Security Anwareness Month, but year-round.
CISOs must understand the key difference between individual and enterprise endpoint security to adequately protect corporate data.
Security teams needs advanced visibility into all endpoints across the organization to prevent endpoint attacks such as the recent Apache Struts exploit.
New malware attacks are using popular router hardware to carry out proxy-based credential stuffing. Admins should regularly install firmware updates.
IBM X-Force reported a downward trend in publicly available exploit code, but security teams must still prioritize vulnerability and patch management.