Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework.
An attacker who gains access won't necessarily walk away with an organization's proprietary data. Here's how a cyberattack framework can help you subvert an attacker already in a network.
How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1
The IBM X-Force IRIS cyberattack preparation and execution frameworks aim to help security teams predict threat actors' motives and tactics and communicate security intelligence more clearly.
Researchers uncovered a spam campaign that threatened to unleash the devastating WannaCry ransomware on unsuspecting victims who failed to pay a fee of roughly $650 by June 22, 2018.
In June's security news, IT experts and educators around the world worked to create a new cybersecurity career pathway through initiatives designed to alleviate the industrywide skills shortage.
IBM X-Force researchers observed several ongoing spam campaigns tied to the World Cup — many of which used the official branding of tournament sponsors to lure victims.
Cybercriminals launched various phishing scams targeting World Cup fans leading up to and during the first week of the monthlong international soccer tournament.
Security leaders must implement phishing awareness programs to train employees to recognize business email compromise (BEC) attacks and other social engineering schemes that could compromise data.
No one is immune to cognitive biases, but how can IT decision-makers ensure that logical flaws don't weaken data security? Learn how to overcome these security flaws that exist in our heads.
Explore some of the most common social engineering tricks used to fool employees into handing over access to sensitive data. These include phishing, tailgating and social media pretexting.