Incident Response April 10, 2018 Keep Your Eyes on the Threat Horizon to Improve Incident Response 3 min read - By keeping their eyes on the threat horizon, security professionals can implement better incident response strategies to contend with evolving cybercriminal tactics.
Threat Intelligence April 4, 2018 2018 IBM X-Force Report: Shellshock Fades, Gozi Rises and Insider Threats Soar 2 min read - The latest IBM X-Force report highlighted threats stemming from misconfigured cloud servers and inadvertent insider negligence and examined malware trends from 2017 that could continue into 2018.
Threat Intelligence April 2, 2018 Know Your Security X’s and O’s: Your Cyberdefense Team Is Only as Good as Its Threat Intelligence 2 min read - Just like a college basketball team needs to know its X's and O's to win the big game and cut down the nets, a security team needs threat intelligence to win the ongoing battle against cyberthreats.
Risk Management March 20, 2018 Enterprise Security Lessons From the Crypto-Mining Craze 3 min read - Recent research has failed to pin down exactly how the current crypto-mining craze is trending, but companies can derive many key enterprise security lessons from the latest headline-grabbing threat.
Security Services January 15, 2018 Advantages of Adding Security-as-a-Service to Reduce Alert Fatigue and Expand Protection 3 min read - Security-as-a-service can help teams sift through the overwhelming volume of alerts more efficiently, enabling them to focus on the threats that are most likely to require intervention.
Fraud Protection December 8, 2017 Cybersecurity, Fraud and Operational Risk: The Time for Cognitive Convergence Is Now 5 min read - The threat landscape is expanding, and organizations must undergo a cognitive convergence to manage evolving security, fraud and operational risks.
Intelligence & Analytics November 21, 2017 Why Knock Innovation? SIEM Didn’t Die — It Evolved 3 min read - SIEM has evolved from its comparatively humble beginnings to integrate user behavior analysis and log management capabilities that are critical to any SOC.
CISO September 25, 2017 From the Starship Enterprise to Your Enterprise: Eight Cybersecurity Lessons From ‘Star Trek’ 5 min read - To prepare for the upcoming "Star Trek: Discovery" series, here are eight cybersecurity lessons companies can learn from the science fiction franchise.
Risk Management August 9, 2017 Assessing Risks and Remediating Threats With a Layered Approach to Vulnerability Management 4 min read - For many companies, vulnerability management still amounts to an ongoing game of whack-a-mole to identify and remediate threats.
June 20, 2017 IBM i2 QRadar Offense Investigator: The New i2 Cyber Threat Hunting App 2 min read - The all-new IBM i2 QRadar Offense Investigator makes it easier for cyberanalysts to gather and pinpoint data trends regarding vulnerabilities and threats.