Cybersecurity industry leaders should define a new threat intelligence model that is three-dimensional, nonlinear, rooted in elementary number theory and that applies vector calculus.
Whether you're protecting data, financial assets or even people, the intelligence cycle can help you gather data and contextualize it in terms of what you already know and what you hope to learn.
The concept of mutually assured destruction (MAD) has historically prevented nuclear war, but threat actors' advanced obfuscation techniques have made cyber deterrence difficult if not impossible.
A watering hole campaign that has been active in Southeast Asia since September has compromised at least 21 websites, including government and media domains.
By conducting regular and comprehensive cyberthreat hunting, organizations can stay one step ahead of malicious actors and soften the blow of a data breach.
A lot of things in the threat intelligence world have multiple names, and these aliases often complicate the process of researching and dealing with security threats.
IBMer Mike Barcomb draws upon his experience in the U.S. Army Reserve to lead a team of incident response experts through careful planning, regular rehearsals and quick decision-making.
Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework.
An attacker who gains access won't necessarily walk away with an organization's proprietary data. Here's how a cyberattack framework can help you subvert an attacker already in a network.
In the external reconnaissance and launch attack phases of the X-Force IRIS cyberattack preparation framework, threat actors look for vulnerabilities and tailor their attacks to exploit them.