The lifecycle management of indicators is an important element to support decisions and actions against attackers. This process informs the courses of action matrix to build a response plan.
Security professionals are not sharing intelligence as effectively as threat actors. The community can build a safer digital future for everyone by adopting more collaborative strategies.
Sridhar Muppidi, CTO of cloud security and IAM at IBM Security, and Shamla Naidoo, global CISO at IBM, took time to discuss topics ranging from AI and blockchain to threat sharing and collaboration.
Threat group RANCOR is leveraging new malware strains to conduct targeted espionage in Southeast Asia, according to a recent report.
Open source intelligence enables analysts to identify threats and uncover details about attacker behavior to improve their decision-making around incident response.
A July 2018 threat report from IBM X-Force Exchange revealed that threat group Magecart exploited unsecured third-party access to steal credit card details from Ticketmaster customers.
Sharing computer security information is now an established practice in IT. But pooling resources in an ISAC can provide greater insight, broader collaboration and improved overall cyber resiliency.
IBM X-Force researchers observed several ongoing spam campaigns tied to the World Cup — many of which used the official branding of tournament sponsors to lure victims.
Threat intelligence should be translated into business-speak to help decision-makers understand the impact of potential threats and incorporate TI into their business strategies.
Analysts can improve and automate their incident response processes by adopting the right malware classification scheme according to specific threat management goals.