X-Force October 17, 2017 Practice: The Best Defense for Responding to Cyber Incidents 2 min read - When it comes to defending an organization against cyberattacks and their aftershocks, the best way to shore up incident response is to practice.
Incident Response October 12, 2017 How an Effective Incident Response Plan Can Help You Predict Your Security Future 3 min read - An incident response plan and thorough analysis of historical threat data can help security teams predict how fraudsters might breach their networks.
October 11, 2017 What Can Business Leaders Do to Stay One Step Ahead of a Data Breach? 3 min read - At the Cambridge Cyber Summit, IBM Security General Manager Marc van Zadelhoff offered three pieces of advice to help business prepare for a data breach.
October 10, 2017 Firms Unprepared for Public Disclosure of Cybersecurity Attacks, IBM Security Vice President Warns 2 min read - IBM's Caleb Barlow suggested that most companies are unprepared to effectively respond to cybersecurity attacks after they are publicly disclosed.
Risk Management October 3, 2017 Basic Security Tools You Cannot Afford to Miss in Your Risk Management Program 5 min read - Security professionals can leverage freely available, open source security tools to protect their environments from threats.
CISO September 25, 2017 From the Starship Enterprise to Your Enterprise: Eight Cybersecurity Lessons From ‘Star Trek’ 5 min read - To prepare for the upcoming "Star Trek: Discovery" series, here are eight cybersecurity lessons companies can learn from the science fiction franchise.
CISO September 21, 2017 When Responding to a Data Breach, Cooperation Is Nine-Tenths of the Law 3 min read - When responding to a data breach, the CISO must work closely with the legal department to minimize the risks of litigation and reputational damage.
Fraud Protection September 18, 2017 Raise the Red Flag: Guidelines for Consuming and Verifying Indicators of Compromise 7 min read - Before sharing indicators of compromise, analysts must consider the sensitivity of the data and verify the identities of the senders and receivers.
Application Security September 13, 2017 Don’t Constrict Your Cyber Potential in 2017 — Upskill With Python Programming Language 3 min read - The highly versatile Python programming language enables developers to write software for penetration testing, web development, applications and more.
CISO September 11, 2017 The CISO’s Guide to Managing Insider Threats 4 min read - To effectively manage and remediate insider threats, the CISO must establish a comprehensive approach to governance, data analysis and incident response.