Malware October 11, 2017 TrickBot Takes to Latin America, Continues to Expand Its Global Reach 4 min read - The cybergang operating the TrickBot banking Trojan were unusually active over the summer, launching new campaigns in Latin America and updating its code.
Risk Management October 3, 2017 Basic Security Tools You Cannot Afford to Miss in Your Risk Management Program 5 min read - Security professionals can leverage freely available, open source security tools to protect their environments from threats.
October 2, 2017 As Cybersecurity Awareness Increases, Information Sharing Lags, Survey Shows 2 min read - Although more than three-quarters of company directors reported a rise in cybersecurity awareness, only one-quarter actively share threat information.
Threat Intelligence September 27, 2017 Put Threat Intelligence Into Action With Security Apps 2 min read - An update to IBM X-Force Exchange provides recommended apps to help users implement threat intelligence into their end-to-end security portfolio.
Fraud Protection September 18, 2017 Raise the Red Flag: Guidelines for Consuming and Verifying Indicators of Compromise 7 min read - Before sharing indicators of compromise, analysts must consider the sensitivity of the data and verify the identities of the senders and receivers.
Threat Intelligence September 13, 2017 What Do Avocados and Threat Intelligence Have in Common? 3 min read - Like a delicious guacamole, security teams need a perfect mix of IP addresses, MD5 checksum hashes and other threat intelligence to protect their networks.
Malware September 12, 2017 Brazilian Malware Client Maximus: Maximizing the Mayhem 5 min read - A new, upgraded version of remote access malware Client Maximus points to the growing sophistication of cybercriminals in Brazil.
Intelligence & Analytics September 8, 2017 A Basic Model to Measure SIEM Maturity 4 min read - Companies looking to improve their ability to protect, control and monitor their technology infrastructures should follow this basic SIEM maturity model.
Risk Management September 6, 2017 Know Your Data and Your Enemies: Establishing a Baseline for Proactive Threat Hunting 3 min read - Threat hunting enables security teams to improve incident response speed and accuracy. It also empowers them to remediate threats proactively.
Intelligence & Analytics September 5, 2017 Seven Steps to Improve Your Security Operations and Response 3 min read - Organizations can improve their security operations and response capabilities by adopting a multilayered approach driven by cognitive technology.