Incident Response October 22, 2018 IBM Security Named a Leader in IDC Incident Response MarketScape Report 2 min read - This year, IDC recognized IBM X-Force Incident Response and Intelligence Services (IRIS) for effectively streamlining incident response (IR) for customers around the globe.
October 19, 2018 New Gallmaker Attack Group Using Living-off-the-Land Tactics in Espionage Campaign < 1 min read - A new attack group known as Gallmaker spied on military and government organizations by employing living-off-the-land tactics.
Fraud Protection October 18, 2018 Why Limor Golan Works Hard to Make Security Operations Easier 4 min read - Limor Golan is a self-described hyperactive developer who works best under stress. Trusteer was so impressed they created a role specifically for her to improve security operations through automation.
Intelligence & Analytics October 11, 2018 How to Use DNS Analytics to Find the Compromised Domain in a Billion DNS Queries 6 min read - Using unique methods of analyzing DNS data, advanced DNS analytics enables security teams to quickly and proactively find and eliminate potential threats.
Intelligence & Analytics October 8, 2018 Does Your SOC Have a Security Playbook? 5 min read - By creating, regularly reviewing and maintaining a security playbook, SOC leaders can position analysts to execute incident response processes more quickly and effectively.
Incident Response October 4, 2018 How Nick Bradley Made a Career of Pursuing Bad Guys, From the Military to X-Force IRIS 4 min read - X-Force IRIS Practice Lead Nick Bradley was on track for an illustrious career in the military police when a computer virus detoured his path towards protection of a different kind.
Endpoint September 25, 2018 Which Mobile Threats Do You Need to Prepare For? 2 min read - As the workforce has embraced digital transformation, the volume and frequency of mobile threats has skyrocketed. Which threats should your organization be worried about?
Intelligence & Analytics September 24, 2018 Following the Clues With DcyFS: A File System for Forensics 5 min read - Decoy File System's overlay layer is a forensic tool that helps security teams piece together what happens during a cyberattack and collect key evidence in the aftermath of a breach.
September 20, 2018 Cobalt Gang Using CobInt Downloader to Install Malware on Systems of Interest 2 min read - Security researchers observed the threat group Cobalt Gang using a downloader known as CobInt to infect and subsequently install additional malware on systems of interest.
Data Protection September 17, 2018 Reconciling Trust With Security: A Closer Look at Cyber Deception With DcyFS 7 min read - Central to DcyFS's cyber deception capabilities is its ability to modulate subject trust through a hierarchical file system organization.