May 20, 2015 How a Fake Password Project Could Make Cybercriminals’ Lives Difficult 2 min read - Researchers have created a fake password project that would allow companies a way to potentially limit the damage of leaked login information.
May 20, 2015 Data Protection: Are Humans the Weakest Link? 2 min read - Are humans the weakest link in data protection? A recent report from law firm BakerHostetler suggests this is case. Can companies mitigate the issue?
Data Protection May 20, 2015 Security Breaches: An Ounce of Prevention? 2 min read - There has been an increased focus on the detection of security breaches, but organizations shouldn't lose sight of the value of prevention.
Threat Intelligence May 19, 2015 Perimeter Protection Is Not Enough 3 min read - IBM X-Force Exchange is giving organizations a safe, anonymous way to share intelligence to move beyond simple perimeter protection.
CISO May 14, 2015 Take Notes: How the Academic World Can Inform Security 4 min read - Experts from the academic world provided information that could contribute to business solutions as part of a study by the IBM Center for Applied Insights.
X-Force May 14, 2015 From the Dark Web to Your Data: Uncovering the Life of a Cyberthreat With Community Knowledge 2 min read - IBM's X-Force Exchange emphasizes collaboration and intelligence sharing, using strategies used in the Dark Web to promote security and defeat criminals.
May 8, 2015 Apple Security Updates Shake Bugs Out of Safari’s Tree 2 min read - New Apple security updates target a number of critical bugs in the Safari browser, specifically those exploiting its open-source WebKit.
Threat Intelligence May 8, 2015 Threat Kinetics: The Arms Race Between Black Hat and White Hat Developers 3 min read - The evolution of threat kinetics to identity kinetics is rapidly advancing, and there are a plethora of organizations pursuing this avenue.
May 7, 2015 ‘S’ for Stick? New HTTPS Requirement Drops the Carrot 2 min read - Mozilla's upcoming HTTPS requirement will force developers to comply with its new security measures or get blocked from the browser.
Intelligence & Analytics May 7, 2015 Threat Intelligence Collaboration Leads to More Efficient, Comprehensive Cybersecurity 8 min read - Multilayered exchanges focused on shared threat intelligence can work to identify, stop and prevent security attacks, limiting the resulting damage.