Threat Hunting August 7, 2017 Threat Hunting Services Are Now a Basic Necessity 4 min read - EDR solutions enable threat hunting teams to fine-tune behavioral detection rules and determine the techniques by which malware spreads through a network.
Intelligence & Analytics August 7, 2017 Security Monitoring and Analytics: From Tools to Platforms 3 min read - An evolved security monitoring and analytics platform — as opposed to a tools-based approach — can help analysts make better use of available threat data.
X-Force July 27, 2017 Hello, My Name Is Space Rogue 3 min read - IBM X-Force Red marked its first anniversary with the addition of security specialists, including Space Rogue, bolstering the team's talent roster.
Energy & Utility July 21, 2017 Employee Education Is the Key to Enhanced Protection for Energy Companies 2 min read - The U.S. energy infrastructure requires enhanced protection, and CISOs must educate their employees about security risks to those critical assets.
Malware July 19, 2017 TrickBot Habla Español: Trojan Widens Its Attack Scope in Spain, Brings Redirection Attacks to Local Banks 3 min read - The TrickBot Trojan has been steadily ramping up its activity this year, going into a rather intensive period of updates and attacks that started in Q2.
Endpoint July 17, 2017 How Virus Protection Software Has Evolved With the Threat Landscape 3 min read - Virus protection software has come a long way in the past 30 years, and the advent of machine learning represents a bright future for malware fighters.
Threat Intelligence July 10, 2017 Information and Communication Technology (ICT) Industry: Second-Most Attacked Sector in 2016 2 min read - The information and communication technology (ICT) industry suffered the second-most attacks out of all sectors monitored by IBM X-Force in 2016.
Intelligence & Analytics July 3, 2017 The Emergence of Virtual Reality and Augmented Reality in the Security Operations Center 4 min read - New technologies like augmented and virtual reality may be the next big thing for security operations centers.
June 20, 2017 IBM i2 QRadar Offense Investigator: The New i2 Cyber Threat Hunting App 2 min read - The all-new IBM i2 QRadar Offense Investigator makes it easier for cyberanalysts to gather and pinpoint data trends regarding vulnerabilities and threats.
Malware June 20, 2017 TrickBot Spreads to the Nordics, Launches Redirection Attacks in France 5 min read - The TrickBot Trojan, which recently tested redirection attacks in France, expanded its list of targets to include banks in Sweden and other Nordic areas.