Risk Management March 22, 2019 Taming Global Cybersecurity Risks Requires a Concerted Cyber Resilience Effort 5 min read - With the realization that "we're all in this together," boards want to learn how their organizations are collaborating with the rest of the ecosystem in planning and testing cyber resilience.
Threat Intelligence February 5, 2019 It’s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare 5 min read - Cybersecurity industry leaders should define a new threat intelligence model that is three-dimensional, nonlinear, rooted in elementary number theory and that applies vector calculus.
CISO February 4, 2019 Drive Innovation With Your Security Strategy in 2019 3 min read - As we enter the second month of 2019, organizations should make sure their security strategy accounts for emerging trends, such as the erosion of customer trust and the cybersecurity skills gap.
Incident Response January 14, 2019 Need a Sounding Board for Your Incident Response Plan? Join a Security Community 3 min read - Joining a security community is a great way to get advice and feedback on your incident response plan from like-minded peers.
January 4, 2019 Ursnif, Emotet, Dridex and BitPaymer Malware Families Team Up to Wreak Havoc 2 min read - Researchers discovered a link between four malware families — Ursnif, Emotet, Dridex and BitPaymer — that suggests threat actors may be combining efforts to develop more sophisticated attack vectors.
Incident Response December 17, 2018 Is It Time to Start a PSIRT? Why Your CSIRT May Not Be Enough 5 min read - Your CSIRT protects your organizational network, but who secures your products? It may be time you started a PSIRT at your company.
Intelligence & Analytics December 4, 2018 Achieve Community Immunity With Security Data Integration 3 min read - With many enterprises unable to fill open roles for cybersecurity professionals, how can organizations boost collaboration to share security data and drive better outcomes?
Network October 22, 2018 Don’t Dwell On It: How to Detect a Breach on Your Network More Efficiently 5 min read - Dwell times for data compromises are still shockingly high. Understand how to detect a breach in your network to improve response and mitigation time.
Intelligence & Analytics October 16, 2018 Simplify Your Security With an Open Cloud-Based Platform 3 min read - Today, we're announcing IBM Security Connect, an open, cloud-based platform that is capable of analyzing federated security data across unconnected tools and environments.
Incident Response October 4, 2018 How Nick Bradley Made a Career of Pursuing Bad Guys, From the Military to X-Force IRIS 4 min read - X-Force IRIS Practice Lead Nick Bradley was on track for an illustrious career in the military police when a computer virus detoured his path towards protection of a different kind.