Incident Response May 30, 2017 Incident Management Tools: An Interview With EMA’s David Monahan 4 min read - With business and IT networks growing more complicated, organizations need full incident management tools to manage and mitigate today's cyberthreats.
Incident Response May 30, 2017 When a Cyber Crisis Hits, Know Your OODA Loops 4 min read - OODA loops can help System 1-thinking security professionals react swiftly to cyberattacks and embrace an intuitive approach to incident response.
Energy & Utility May 26, 2017 Personalizing Energy Security With Robust Analytics 3 min read - To deliver the level of personalization today's prosumers demand, utilities must support their energy security strategies with predictive analytics.
Incident Response May 25, 2017 Incident Response: Planning for the Attack Before It Happens 2 min read - An effective backup strategy is simply one part of a larger security and incident response plan, which should be developed proactively.
Intelligence & Analytics May 17, 2017 Lessons Learned From the WannaCry Ransomware Attack and Many Others That Preceded It 3 min read - The best strategy to defend against the WannaCry ransomware attack and similar events is to adopt tools to prevent them from occurring in the first place.
May 16, 2017 Protect Against the WannaCry Ransomware Attack With IBM X-Force Threat Intelligence With QRadar 4 min read - Organizations affected by the WannaCry ransomware attack can leverage IBM X-Force Threat Intelligence with QRadar to mitigate this unprecedented threat.
Intelligence & Analytics May 12, 2017 More Than Meets the Eye: Five Common Misunderstandings About SIEM Solutions 2 min read - SIEM solutions are not meant to prevent security breaches. Rather, they are designed to strengthen the organization's overall security posture.
Incident Response May 8, 2017 Five Whys: Lessons From the World of Incident Investigations 3 min read - Cybersecurity is all about asking the right questions. The Five Whys method can help analysts prevent near misses from becoming full-blown incidents.
Intelligence & Analytics May 5, 2017 Threat Intelligence in the Age of Cyber Warfare 3 min read - In the age of cyber warfare, security analysts must determine which assets are most critical and prioritize their defense strategies accordingly.
Application Security April 25, 2017 The Apache Struts 2 Vulnerability and the Importance of Patch Management 4 min read - The disclosure of an Apache Struts 2 vulnerability made the framework a lucrative target and highlighted the importance of patch management.