May 16, 2018 Threat Intelligence Shows Tried and True Techniques Continue to Work for Hackers 2 min read - According to new threat intelligence data, simple threats, such as phishing and drive-by downloads, remain popular among cybercriminals.
Intelligence & Analytics May 15, 2018 Best Practices for Designing a Security Operations Center 3 min read - Designing a security operations center (SOC) is not as simple as setting and forgetting an SIEM solution. Security leaders must consider human factors, business needs, budgetary constraints and more.
Intelligence & Analytics May 14, 2018 Threat Intelligence Machine Learning Adoption: Time to Ditch the Black Box Security Analytics 4 min read - While studies reveal the majority of CTI adopters are dissatisfied with threat intelligence machine learning adoption, there's evidence the adversary is already using algorithms to their advantage.
Risk Management May 14, 2018 The Cherry on Top: Add Value to Existing Risk Management Activities With Open Source Tools 4 min read - Organizations with established risk management processes can drive efficiency and improve their overall risk posture by leveraging open source tools.
CISO May 8, 2018 WHOIS Behind Cyberattacks? Under GDPR, We May Not Know 5 min read - GDPR's implementation on an issue relevant to the cybersecurity industry may well have negative consequences that (ironically) run contrary to its original intent.
Incident Response May 1, 2018 Simpler, Smarter Security With Intelligent Orchestration 4 min read - IBM's new Intelligent Orchestration offering enables analysts to streamline their investigations via integrations and incident response playbooks.
Endpoint April 26, 2018 Is End-to-End IoT Security Financially Feasible — or Even Possible? 3 min read - Organizations can build toward end-to-end IoT security by understanding the risks connected devices pose to their networks and analyzing how they interact with corporate data.
Incident Response April 23, 2018 How to Choose the Right Malware Classification Scheme to Improve Incident Response 6 min read - Analysts can improve and automate their incident response processes by adopting the right malware classification scheme according to specific threat management goals.
Banking & Finance April 18, 2018 Q1 2018 Results: Gozi (Ursnif) Takes Larger Piece of the Pie and Distributes IcedID 3 min read - Gozi took a larger slice of the financial malware pie and become the most active banking Trojan in 2017, according to the IBM X-Force Threat Intelligence Index 2018.
Intelligence & Analytics April 17, 2018 Collaboration Among Security Vendors Is the Threat Management Solution of the Future 2 min read - To stay ahead of tomorrow's cyberthreats, organizations need a threat management solution that consolidates disparate security products into a centralized platform.