February 13, 2017 Threat Hunting Is a Top Security Priority for 2017 2 min read - According to a recent survey, threat hunting has moved to the top of security professionals' agenda in response to the ever-growing volume of cyberattacks.
Threat Intelligence February 10, 2017 Overcoming the Security Side-Eye: Making Collaborative Threat Intelligence Work 3 min read - To effectively share threat intelligence, security professionals must develop processes, resources and trust relationships with other industry players.
February 9, 2017 IBM and HCL to Drive Growth and Innovation in Application Security Space 2 min read - IBM and HCL have partnered to build additional application security features and functionalities based on business realities and client priorities.
Threat Hunting February 1, 2017 Enterprise Intelligence Brief: Threat Hunting Takes Center Stage 5 min read - Threat hunting can help organizations transition from reactive to proactive defense strategies and start thinking like cybercriminals.
Incident Response February 1, 2017 Use Threat Intelligence to Improve Your Cyber Resilience 2 min read - Adversaries are working together to become smarter — and it's time we did too. Leveraging threat intelligence is a big part of becoming more aware.
Intelligence & Analytics January 30, 2017 Proactively Protect Your IT Immune System With Security Operations and Response 3 min read - IBM's Security Operations and Response platform enables IT analysts to proactively hunt for threats and respond to incidents with advanced analytics.
Fraud Protection January 23, 2017 An Evolving Threat: Ransomware in 2017 3 min read - IT leaders must prepare to protect their environments from new types of ransomware in 2017, since the new year is sure to bring fresh threats.
Threat Intelligence January 19, 2017 Expanding Threat Intelligence in IBM X-Force Exchange 2 min read - The Threat Feed Manager tool in X-Force Exchange enables analysts to integrate threat intelligence data into collections to share with the IT community.
Intelligence & Analytics January 17, 2017 Applying Machine Learning to Improve Your Intrusion Detection System 6 min read - Security analysts can train intelligent intrusion detection systems to distinguish between normal and malicious traffic by creating generic data sets.
Malware January 10, 2017 Client Maximus: New Remote Overlay Malware Highlights Rising Malcode Sophistication in Brazil 7 min read - IBM X-Force researchers discovered a new malware called Client Maximus that contains advanced code written specifically to attack banks in Brazil.