Malware May 4, 2017 Neverquest Gang Takes Leave — Is It the End of the Quest? 5 min read - IBM X-Force researchers recently observed a massive drop in Neverquest malware campaigns. Is it the end of an era for this Trojan?
Intelligence & Analytics May 3, 2017 Know Your Apps: Explore the IBM Security App Exchange Ecosystem for Collaborative Defense 3 min read - Security collaboration hits the next level with the IBM Security App Exchange, a marketplace for the security community to create and share apps.
Intelligence & Analytics April 19, 2017 Surfing the Tsunami of Threat Data With Cognitive Security 2 min read - Nowadays, most organizations' networks are under constant attack. Cognitive security is the key to locating IoCs within the tsunami of threat intelligence.
Data Protection April 14, 2017 Swimming in Security Data Without Drowning 4 min read - With so much security data and threat intelligence available, IT professionals are struggling to stay afloat in this expansive ocean of information.
Threat Intelligence April 10, 2017 Use Email to Manage Threat Intelligence Collections 2 min read - The IBM X-Force Exchange includes an email inbox feature that cuts down on information overload and enables analysts to easily share threat intelligence.
Risk Management April 7, 2017 Do Threat Intelligence Exchanges Really Work? 2 min read - Threat intelligence exchanges enable companies to detect and respond to incidents more effectively, but only if they take the necessary steps to prepare.
Threat Intelligence March 29, 2017 2016: The Year of the Mega Breach 2 min read - The latest edition of the IBM X-Force Threat Intelligence Index detailed how companies were affected by data breaches during the "year of the mega breach."
Malware March 28, 2017 The NukeBot Trojan, a Bruised Ego and a Surprising Source Code Leak 4 min read - After being spurned by his cybercriminal peers on underground forums, the creator of NukeBot apparently leaked the banking Trojan's source code.
Risk Management March 28, 2017 Simplifying Risk Management 5 min read - To properly manage risk, security analysts must understand the threats and vulnerabilities that exist on their networks and assess their consequences.
Artificial Intelligence March 23, 2017 Virtual Reality, Augmented Reality and Futuristic Threat Modeling 4 min read - Augmented and virtual reality can be invaluable tools for threat modeling in all sectors, but the emerging technologies also introduce new vulnerabilities.