STIX is the language used to share cyberthreats, and all security professionals and organizations should know how to use it effectively.
A recent study from one security firm indicated that macro malware is experiencing a renaissance among cybercriminals. Here's what you need to know.
According to a recent report, most victims of a DDoS attack claimed to know who their attackers were. Understanding motivations was not as clear.
2015 was an epic year for cybercrime. Take a look at some of the most notable attacks and developments from the past 12 months.
IBM is moving into the next phase of collaborative defense with the addition of two new security and threat intelligence tools.
Distributed denial-of-service (DDoS) attacks evolved throughout 2015 to become more sophisticated and harder to defend against.
As the season of reflection and thanks is upon us, we here at Security Intelligence decided to ask what our contributors are thankful for this year.
What happens when a kitten and an information security analyst walk into a bar? In one scenario, the kitten teaches the expert some things about security.
Insider threats could be carrying out economic espionage against your organization. How do you protect against this very real risk?
IBM's X-Force Exchange encourages security professionals to share threat intelligence information, which in turn helps the entire industry advance.