X-Force November 17, 2015 A Look Back With IBM X-Force: Lessons Learned From Security Research in 2015 2 min read - The latest 2015 IBM X-Force Threat Intelligence Quarterly focuses on the lessons learned from security research throughout the year.
CISO November 13, 2015 Security On Demand: From Endpoint to Mainframe, Passing Through the Cloud 2 min read - There are many security tools available to enterprises today, and the current threat landscape is forcing providers to alter their offerings.
November 12, 2015 UK Spy Agency Partners With Industry and Academia on Cybersecurity Research Program 2 min read - The U.K. government, the spy agency GCHQ and various academic and business partners are pulling together for a cybersecurity research program.
November 11, 2015 Friday Is Peak Malware Distribution Day, Study Shows 3 min read - Malware distribution tends to peak on Friday, according to a new study from Cyren. Here's what else the report had to say about cyberthreats.
Endpoint November 4, 2015 In a Sea of Cyberthreats, Don’t Be Distracted by the Shark — Look for the Snails! 2 min read - The genius behind Shark Week is that it sells fear of a threat that you'll likely never encounter. Can the same be said about security vulnerabilities?
Advanced Threats October 16, 2015 What Is Polymorphic Malware and Why Should I Care? 2 min read - Polymorphic malware may be a serious threat, but some of the strategies used to create it could be applied to malware defenses, as well.
Fraud Protection October 12, 2015 The Dyre Trojan and the Art of War < 1 min read - The Dyre Trojan is a great example of a threat that combines sophisticated tactics with an impressive strategy, resulting in a worthy cyber opponent.
October 9, 2015 New Remote-Access Trojan Skitters Through Security Undetected 3 min read - A new remote-access Trojan (RAT) named Moker has been discovered by security researchers — and has skittered past every security measure used.
October 7, 2015 Nuclear Facilities Not Ready for Cyberattacks: What’s the Fallout? 3 min read - According to a new Chatham House report, nuclear facilities aren't ready for cyberattacks. What's the possible fallout facing this industry?
Threat Intelligence October 7, 2015 Comparing Different Tools for Threat Sharing 4 min read - Threat sharing is getting more and more attention from security professionals to detect and quickly respond to security threats.