Researchers discovered a new ATM fraud scheme that attacks both the front and back ends of ATM networks virtually, making it harder to remediate than traditional schemes that target physical machines.
IBMer Mike Barcomb draws upon his experience in the U.S. Army Reserve to lead a team of incident response experts through careful planning, regular rehearsals and quick decision-making.
Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework.
Explore seven characteristics of security risk from the dark and hidden web. Learn how organizations can capture the latent value of dark-sourced threat intelligence.
An attacker who gains access won't necessarily walk away with an organization's proprietary data. Here's how a cyberattack framework can help you subvert an attacker already in a network.
Security researchers identified two new threats in the wild that are designed to compromise consumer devices to build IoT botnets.
Whether you're most interested in smart city security, vulnerability management or an epic game of CTF, we'll help you get the most out of your time in Las Vegas this week.
In the external reconnaissance and launch attack phases of the X-Force IRIS cyberattack preparation framework, threat actors look for vulnerabilities and tailor their attacks to exploit them.
How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1
The IBM X-Force IRIS cyberattack preparation and execution frameworks aim to help security teams predict threat actors' motives and tactics and communicate security intelligence more clearly.
The Science Channel documentary, "Dark Web: Fighting Cybercrime," shows why practice runs are essential to help security teams and business leaders keep their cool in the face of a cyberattack.