Financial services industry leaders visited the IBM X-Force Command Cyber Range for a war game exercise designed to battle-test their response to a systemic cyberattack.
User behavior analytics (UBA) is a good application, but it isn't a replacement for SIEM. UBA is more accurately described as a cybersecurity application that can be added on top of an SIEM tool.
Nearly one-third of incidents reported in Q3 were classified as "destructive attacks," according to a recent report, putting election security at risk leading up to the 2018 midterms.
This year, IDC recognized IBM X-Force Incident Response and Intelligence Services (IRIS) for effectively streamlining incident response (IR) for customers around the globe.
By creating, regularly reviewing and maintaining a security playbook, SOC leaders can position analysts to execute incident response processes more quickly and effectively.
A lot of things in the threat intelligence world have multiple names, and these aliases often complicate the process of researching and dealing with security threats.
Ransomware recovery can be costly for companies with no defense strategy in place. Here's what your organization can do to protect itself from these ever-evolving threats.
Analysts can improve and automate their incident response processes by adopting the right malware classification scheme according to specific threat management goals.
An automated security analytics platform can help understaffed security teams sift through threat data more efficiently and focus on more critical tasks.
Having an incident response team can drastically improve the reaction to a security event, but businesses have to invest in the right areas.