Endpoint November 20, 2017 Wireless Security Lessons From the WPA2 Vulnerability 3 min read - One of the biggest WPA2 vulnerability wireless security lessons: Few people are aware, fewer know how to patch it and fewer still will do so.
September 11, 2017 Speedy Security Breach: Threat Actors Develop Apache Exploit Within Hours of Disclosure 2 min read - Even with a patch available for the new Struts vulnerability, threat actors developed new exploits within hours and coordinated security breach attacks.
Incident Response August 1, 2017 Make Attorney-Client Privilege Part of Your Incident Response Strategy 2 min read - Attorney-client privilege can be a key asset to an organization's incident response strategy in the event of a security breach.
Threat Intelligence March 29, 2017 2016: The Year of the Mega Breach 2 min read - The latest edition of the IBM X-Force Threat Intelligence Index detailed how companies were affected by data breaches during the "year of the mega breach."
Data Protection December 7, 2016 Stranger Than Fiction? The Six Weirdest 2016 Data Breaches 4 min read - The list of notable 2016 data breaches is long and wacky. Cybercriminals compromised food delivery apps, FBI databases and seemingly everything in between.
Intelligence & Analytics April 17, 2015 The Definition of Security Intelligence 4 min read - IBM Security Intelligence Product expert Mark Ehr offers strategy guidance to help IT security teams effectively detect and respond to threats.
Government March 31, 2015 US State Department Hack Has Major Security Implications 2 min read - The U.S. State Department is the latest government agency to be targeted by cybercriminals, with a phishing email leading to a breach of the network.
Endpoint March 30, 2015 From Health Care to Health Crisis: A Consumer’s Perspective on Health System Breaches and Stolen Customer Data 3 min read - After being the victim of a health system breach that stole my customer data, I realized organizations need to invest in a threat protection system.
X-Force March 19, 2015 Security Snowflakes: Interactive IBM X-Force Feature Visualizes Data Breach Records 4 min read - IBM X-Force recently released an interactive data breach chart that helps visualize the different types of data breaches that have been reported over time.
Healthcare February 26, 2015 Healing the Wounds Caused by Health Care Fraud and Health Insurance Fraud 3 min read - The health care and insurance sectors are under pressure to safeguard their operations in the light of rising health insurance fraud threats.