A new campaign involving the Ramnit botnet that infected 100,000 computers over a two-month period may foreshadow an even larger attack, researchers warn.
The International Standards Organization (ISO) recently released an updated version of its security risk-management guidelines, ISO/IEC 27005:2018. Here are the key lessons.
Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework.
An attacker who gains access won't necessarily walk away with an organization's proprietary data. Here's how a cyberattack framework can help you subvert an attacker already in a network.
In the external reconnaissance and launch attack phases of the X-Force IRIS cyberattack preparation framework, threat actors look for vulnerabilities and tailor their attacks to exploit them.
How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1
The IBM X-Force IRIS cyberattack preparation and execution frameworks aim to help security teams predict threat actors' motives and tactics and communicate security intelligence more clearly.
Follow along with risk and compliance officer Frank Roth as he endeavors to fill in the gaps of an outdated (and incomplete) risk management framework in his new role at a utility company.
The International Standards Organization (ISO) released an updated version of its risk management guidelines to help security leaders engage top leadership in cyber risk decision-making.
When organizations follow frameworks such as Gartner's Data-Centric Audit and Protection (DCAP) guidelines, security and compliance can coexist and even complement one another.
Companies that wish to do business with federal government agencies in the cloud must complete these 10 steps to achieve FedRAMP compliance.