Malware March 28, 2017 The NukeBot Trojan, a Bruised Ego and a Surprising Source Code Leak 4 min read - After being spurned by his cybercriminal peers on underground forums, the creator of NukeBot apparently leaked the banking Trojan's source code.
Risk Management March 28, 2017 Simplifying Risk Management 5 min read - To properly manage risk, security analysts must understand the threats and vulnerabilities that exist on their networks and assess their consequences.
Artificial Intelligence March 23, 2017 Virtual Reality, Augmented Reality and Futuristic Threat Modeling 4 min read - Augmented and virtual reality can be invaluable tools for threat modeling in all sectors, but the emerging technologies also introduce new vulnerabilities.
Threat Hunting March 21, 2017 Understanding Cyber Threat Hunting 3 min read - When implementing threat hunting programs for the first time, IT teams should start with basic concepts, then add more capabilities gradually.
Threat Intelligence March 13, 2017 Enticing Clicks With Spam 5 min read - According to the upcoming IBM X-Force Threat Intelligence Index, the creation of new TLDs is generating new ways for fraudsters to distribute spam.
Threat Intelligence March 9, 2017 Showcasing Threat Intelligence at IBM InterConnect 3 min read - At InterConnect 2017, experts will demonstrate how IBM is applying Watson for Cyber Security to take threat intelligence to the next level.
Security Services March 8, 2017 Information Overload — Now What? 3 min read - Too many security solutions can generate information overload, but a unified managed security services solution can help IT teams reduce the noise.
Intelligence & Analytics March 7, 2017 The Role of the Security Intelligence Analyst and the Three Main Elements of Cybersecurity 3 min read - Security intelligence analysts must know the three elements of cybersecurity — threat intelligence, event intelligence and enrichment — to thwart threats.
Malware March 1, 2017 GootKit Developers Dress It Up With Web Traffic Proxy 6 min read - X-Force researchers revealed the cybergang behind Gootkit had upgraded the banking Trojan with new network interception and certificate bypass methods.
Intelligence & Analytics February 23, 2017 Connecting the Dots With the IBM Cognitive SOC and Watson for Cyber Security 5 min read - With IBM's Cognitive SOC and Watson for Cyber Security, analysts can detect and respond to incidents that traditional threat intelligence platforms miss.