Intelligence & Analytics July 5, 2017 Spot (and Remedy) the Rotten Apple Before It Spoils the SIEM Barrel 2 min read - It can be hard to determine false alarm security events with SIEM solutions. Through IBM's new partnership with AlgoSec, your team has a new tool to help.
Intelligence & Analytics July 3, 2017 The Emergence of Virtual Reality and Augmented Reality in the Security Operations Center 4 min read - New technologies like augmented and virtual reality may be the next big thing for security operations centers.
June 20, 2017 IBM i2 QRadar Offense Investigator: The New i2 Cyber Threat Hunting App 2 min read - The all-new IBM i2 QRadar Offense Investigator makes it easier for cyberanalysts to gather and pinpoint data trends regarding vulnerabilities and threats.
CISO June 6, 2017 Avoiding Security Hype, the Hazard From Hollywood 2 min read - Unfortunately, the Hollywood approach of security hype doesn't do much to help organizations improve their actual security.
Intelligence & Analytics May 26, 2017 Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications 2 min read - Security intelligence solutions such as QRadar UBA enable analysts to detect potentially malicious activity on Microsoft Office 365 cloud-based apps.
Intelligence & Analytics May 12, 2017 More Than Meets the Eye: Five Common Misunderstandings About SIEM Solutions 2 min read - SIEM solutions are not meant to prevent security breaches. Rather, they are designed to strengthen the organization's overall security posture.
Data Protection April 14, 2017 Swimming in Security Data Without Drowning 4 min read - With so much security data and threat intelligence available, IT professionals are struggling to stay afloat in this expansive ocean of information.
Intelligence & Analytics April 5, 2017 Becoming an Agile Cyber-Ninja: Implementing SIEM the Right Way in 2017 3 min read - To get the most out of SIEM tools such as QRadar, security analysts should abandon the traditional Waterfall methodology and adopt the Agile approach.
Threat Hunting March 21, 2017 Understanding Cyber Threat Hunting 3 min read - When implementing threat hunting programs for the first time, IT teams should start with basic concepts, then add more capabilities gradually.
Intelligence & Analytics March 7, 2017 The Role of the Security Intelligence Analyst and the Three Main Elements of Cybersecurity 3 min read - Security intelligence analysts must know the three elements of cybersecurity — threat intelligence, event intelligence and enrichment — to thwart threats.