August 14, 2017 Git Vulnerabilities Found in Version Control Systems 2 min read - Three popular version control systems were found to contain vulnerabilities that could enable threat actors to steal source code.
Artificial Intelligence August 14, 2017 Elementary, My Dear Watson: Identifying and Understanding Malware With Cognitive Security 3 min read - Cognitive security solutions such as IBM Watson for Cyber Security help analysts process overwhelming amounts of threat data during incident investigations
Cloud Security August 11, 2017 Cloud Security and the New Cold War: Corporate Strategies for Winning Digital Battles 3 min read - Companies and governments around the world must test their cloud security capabilities to keep sensitive data safe from hacktivists and cyber enemies.
Threat Hunting August 7, 2017 Threat Hunting Services Are Now a Basic Necessity 4 min read - EDR solutions enable threat hunting teams to fine-tune behavioral detection rules and determine the techniques by which malware spreads through a network.
Intelligence & Analytics August 7, 2017 Security Monitoring and Analytics: From Tools to Platforms 3 min read - An evolved security monitoring and analytics platform — as opposed to a tools-based approach — can help analysts make better use of available threat data.
X-Force July 27, 2017 Hello, My Name Is Space Rogue 3 min read - IBM X-Force Red marked its first anniversary with the addition of security specialists, including Space Rogue, bolstering the team's talent roster.
Energy & Utility July 21, 2017 Employee Education Is the Key to Enhanced Protection for Energy Companies 2 min read - The U.S. energy infrastructure requires enhanced protection, and CISOs must educate their employees about security risks to those critical assets.
Malware July 19, 2017 TrickBot Habla Español: Trojan Widens Its Attack Scope in Spain, Brings Redirection Attacks to Local Banks 3 min read - The TrickBot Trojan has been steadily ramping up its activity this year, going into a rather intensive period of updates and attacks that started in Q2.
Endpoint July 17, 2017 How Virus Protection Software Has Evolved With the Threat Landscape 3 min read - Virus protection software has come a long way in the past 30 years, and the advent of machine learning represents a bright future for malware fighters.
Threat Intelligence July 10, 2017 Information and Communication Technology (ICT) Industry: Second-Most Attacked Sector in 2016 2 min read - The information and communication technology (ICT) industry suffered the second-most attacks out of all sectors monitored by IBM X-Force in 2016.