Threat intelligence sharing is becoming imperative for improving organizations' security, but it needs the right collaborative approach to be successful.
IBM X-Force recently released an interactive data breach chart that helps visualize the different types of data breaches that have been reported over time.
Today, IBM released the first 2015 X-Force Threat Intelligence Quarterly, along with the announcement of the X-Force Interactive Security Incident website.
In the second part of this two-part series, IBM's Mark Yason discusses in more depth the Regin plugin framework hosted in the dispatcher module.
The Infrastructure Protection track at InterConnect will feature insights from the IBM X-Force Research and Development team and customer success stories.
A Linux zero-day vulnerability, dubbed "Ghost," was recently discovered. It lets malicious code execute on servers that use the glibc functionality.
IBM would like to honor Michael Hamelin, a former X-Force employee who was tragically killed in an automobile accident in December 2014.
Here is a look at the remote code execution bug in OpenSSL's DTLS, how it works and the different ways cybercriminals might leverage it for exploitation.
IBM X-Force has found a social login attack that lets attackers intrude in many websites' local accounts and has alerted those affected by it.
As organizations continue to utilize the Internet of Things (IoT), they need to keep app security in mind to keep their enterprises safe from attacks.