Collaborative defense connects an organization's people, processes and technology to deliver improved security through open integrations, threat intelligence sharing and digital transformation.
According to new threat intelligence data, simple threats, such as phishing and drive-by downloads, remain popular among cybercriminals.
Designing a security operations center (SOC) is not as simple as setting and forgetting an SIEM solution. Security leaders must consider human factors, business needs, budgetary constraints and more.
While studies reveal the majority of CTI adopters are dissatisfied with threat intelligence machine learning adoption, there's evidence the adversary is already using algorithms to their advantage.
Organizations with established risk management processes can drive efficiency and improve their overall risk posture by leveraging open source tools.
GDPR's implementation on an issue relevant to the cybersecurity industry may well have negative consequences that (ironically) run contrary to its original intent.
IBM's new Intelligent Orchestration offering enables analysts to streamline their investigations via integrations and incident response playbooks.
Organizations can build toward end-to-end IoT security by understanding the risks connected devices pose to their networks and analyzing how they interact with corporate data.
Analysts can improve and automate their incident response processes by adopting the right malware classification scheme according to specific threat management goals.
Gozi took a larger slice of the financial malware pie and become the most active banking Trojan in 2017, according to the IBM X-Force Threat Intelligence Index 2018.