X-Force December 14, 2017 New Year, New Threats: Five Security Predictions That Will Take Hold in 2018 3 min read - The IBM Security X-Force team offered some security predictions for new trends in the technology landscape and threats that are poised to emerge in 2018.
Incident Response December 7, 2017 Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition 5 min read - At IRISSCON 2017, 48 contestants across 12 teams battled it out in a free-for-all CTF competition to test their hacking, defending and forensics skills.
Endpoint November 30, 2017 The Case for Endpoint Detection and Response Tools: Why Traditional Protection Fails 3 min read - Following recent malware evolution, modern endpoint detection and response tools should not rely on just one trigger event, but on sophisticated logic.
Network November 29, 2017 All Aboard! Applying the Security Immune System Approach to the Railroad Industry 2 min read - When it comes to protecting the railroad industry from cyberthreats, the security immune system approach can reduce incident triage from months to minutes.
Incident Response November 13, 2017 The Grasshopper, the Ants and the Incident Response Plan 3 min read - The passive Grasshopper should be more like the Ants, who use IBM Resilient to support their robust and comprehensive incident response plan.
Data Protection November 13, 2017 The Emperor’s New Insider Threats 3 min read - The Emperor was the greatest CISO in the land. His castle was as safe as could be, and there were no insider threats to be found — or so he thought.
Incident Response November 2, 2017 Diving Deeper to Understand, Investigate and Mitigate Cyberthreats 2 min read - Investigative analysis tools enable SOC teams to proactively hunt for and mitigate cyberthreats instead of meticulously collecting and curating data.
Intelligence & Analytics October 27, 2017 Investigating IoT Crime in the Age of Connected Devices 3 min read - To fight IoT crime, security professionals must properly classify incidents and connect seemingly disparate strings of evidence.
Threat Intelligence October 25, 2017 Threat Intelligence: A Tear-Free Solution to Help SOC Analysts Prepare for the Next WannaCry 2 min read - An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware.
Incident Response October 18, 2017 How to Increase Transparency and Rebuild Trust After a Data Breach 2 min read - In the wake of a data breach, organizations should strive to be as transparent and responsive as possible to rebuild customer trust.