Risk Management August 23, 2017 Blindfolded on the Battlefield: The Importance of Threat Hunting in the Modern Age 3 min read - To keep up with today's advanced cybercrime landscape, security professionals must take a proactive approach to threat hunting and incident response.
August 22, 2017 Is Antivirus Protection Still Relevant? 2 min read - A survey of Black Hat attendees showed that many security experts doubt the ability of antivirus protection products to detect ransomware.
Intelligence & Analytics August 21, 2017 Security Monitoring and Analytics: Moving Beyond the SIEM 2 min read - A platform approach to security monitoring empowers analysts to take their SIEM to the next level with advanced threat detection and response capabilities.
August 17, 2017 IBM and Check Point: Breaking New Ground in Collaborative Defense 3 min read - IBM and Check Point are pairing up to provide increased security protections, which include automating endpoint detection and communication.
Risk Management August 9, 2017 Assessing Risks and Remediating Threats With a Layered Approach to Vulnerability Management 4 min read - For many companies, vulnerability management still amounts to an ongoing game of whack-a-mole to identify and remediate threats.
Threat Hunting August 7, 2017 Threat Hunting Services Are Now a Basic Necessity 4 min read - EDR solutions enable threat hunting teams to fine-tune behavioral detection rules and determine the techniques by which malware spreads through a network.
Endpoint July 17, 2017 How Virus Protection Software Has Evolved With the Threat Landscape 3 min read - Virus protection software has come a long way in the past 30 years, and the advent of machine learning represents a bright future for malware fighters.
Fraud Protection June 26, 2017 New Threats? No Problem! Identify Emerging Cybercrime Trends Early to Fight Financial Fraud 2 min read - Banks and financial institutions require a dynamic strategy to identify emerging cybercrime trends and stop fraudsters in their tracks.
CISO May 30, 2017 Four New Cyberthreats on the CISO’s Radar 2 min read - An effective defense against cyberattacks such as ransomware, dronejacking and hacktivism requires a deep understanding of the evolving threat landscape.
Fraud Protection March 27, 2017 Hey Phishing, You Old Foe — Catch This Cognitive Drift? 4 min read - Powered by machine learning, IBM Trusteer can help IT professionals nip phishing attacks in the bud with unprecedented speed and accuracy.