Intelligence & Analytics September 24, 2018 Following the Clues With DcyFS: A File System for Forensics 5 min read - Decoy File System's overlay layer is a forensic tool that helps security teams piece together what happens during a cyberattack and collect key evidence in the aftermath of a breach.
Artificial Intelligence September 21, 2018 How Can Companies Defend Against Adversarial Machine Learning Attacks in the Age of AI? 5 min read - Machine learning can strengthen your security posture, but it's not without its blind spots. What do adversarial machine learning attacks look like, and how can companies stop them?
Endpoint September 20, 2018 Ransomware 101: What Is Ransomware and How Can You Protect Your Business? 6 min read - What is ransomware? In short, it's malware that encrypts your data and demands a ransom fee for its supposed safe return. The best defense against this threat is to keep it off the network altogether.
Threat Intelligence September 14, 2018 Don’t Get Caught Off Base: Make Threat Intelligence a Security Imperative 3 min read - Security teams can better prepare for cyberattacks by leveraging the different types of threat intelligence to inform decision-making at various levels of the enterprise.
Artificial Intelligence September 4, 2018 Checkmate: How to Win the Cybersecurity Game 4 min read - Some refer to information security as a war, but it's better to think of it as a game. To win the cybersecurity game, you need to immerse yourself, practice and retrain regularly.
CISO August 30, 2018 Why Your Organization Should Invest in Cybersecurity Insurance 3 min read - Despite the rising cost of a data breach, many organizations still believe they don't need cybersecurity insurance.
Incident Response August 29, 2018 Cybersecurity Muscle Memory: Drilling for a Tight Incident Response 3 min read - It's not enough to follow a rough outline of your incident response strategy. Conduct regular, intensive, detailed exercises within a well-defined framework to establish cybersecurity muscle memory.
Intelligence & Analytics August 28, 2018 3 Key Areas of Security Operations to Benchmark and Evaluate 3 min read - SOC leaders should benchmark against speed, intelligence and accuracy to effectively measure and, ultimately, improve their security operations workflow.
Incident Response August 24, 2018 Security Gamification Engineer Richard Moore Proves That Anyone Can Be a Hacker 5 min read - Security gamification engineer Richard Moore designs cyberthreat scenarios to unlock the competitive spirit of cybersecurity professionals and demonstrate how easy it is for anyone to hack a system.
Incident Response August 14, 2018 How John Clarke Shifted Gears From Driving Vans to Gamifying Incident Response 4 min read - Ten years ago, John Clarke was driving a van in Ireland for a living. Today, he develops games at IBM to help train security professionals on incident response and cyber situational awareness.