Intelligence & Analytics September 8, 2017 A Basic Model to Measure SIEM Maturity 4 min read - Companies looking to improve their ability to protect, control and monitor their technology infrastructures should follow this basic SIEM maturity model.
Risk Management September 6, 2017 Know Your Data and Your Enemies: Establishing a Baseline for Proactive Threat Hunting 3 min read - Threat hunting enables security teams to improve incident response speed and accuracy. It also empowers them to remediate threats proactively.
Intelligence & Analytics September 5, 2017 Seven Steps to Improve Your Security Operations and Response 3 min read - Organizations can improve their security operations and response capabilities by adopting a multilayered approach driven by cognitive technology.
Network August 30, 2017 Keep Intruders Out of Your Network With Proactive Threat Hunting 3 min read - Threat hunting promotes a proactive approach to security monitoring and incident response, making it harder for intruders to breach your network.
Incident Response August 28, 2017 Using a Free Online Malware Analysis Sandbox to Dig Into Malicious Code 6 min read - A public malware sandbox can be a great substitute for an in-house malware analysis solution — as long as you understand its limitations.
Risk Management August 23, 2017 Blindfolded on the Battlefield: The Importance of Threat Hunting in the Modern Age 3 min read - To keep up with today's advanced cybercrime landscape, security professionals must take a proactive approach to threat hunting and incident response.
August 17, 2017 IBM and Check Point: Breaking New Ground in Collaborative Defense 3 min read - IBM and Check Point are pairing up to provide increased security protections, which include automating endpoint detection and communication.
Threat Intelligence August 17, 2017 Incident Response and Threat Intelligence: A Potent One-Two Punch to Fight Cybercrime 4 min read - IBM X-Force IRIS combines incident response with threat intelligence to help organizations analyze cybercriminals' behavior and predict future trends.
Fraud Protection August 17, 2017 Protecting Against Spam and Phishing Attacks With a Layered Approach to Email Security 3 min read - To protect their users from spam and phishing attacks, security professionals should adopt a basic, layered approach to email security.
Threat Intelligence August 16, 2017 Stay Up to Date on Threat Intelligence With New X-Force Exchange Capabilities 2 min read - The IBM X-Force Exchange features new capabilities and notifications to help security analysts collaborate and share threat intelligence more efficiently.