Risk Management April 11, 2017 Architectures for Securing IT Systems 5 min read - IT analysts can refer to the human immune system as a model for securing IT systems through careful vetting of data and prioritization of threats.
Risk Management April 6, 2017 Can Cyber Situational Awareness Prevent the Next Black Swan Cyber Event? 4 min read - Security analysts cannot predict black swan events, but they can estimate the likelihood of a damaging breach through cyber situational awareness.
CISO April 5, 2017 Signs That You’re About to Suffer a Security Breach 2 min read - Security leaders must communicate effectively with executives and monitor users for signs that the organization is about to suffer a security breach.
Risk Management March 28, 2017 Simplifying Risk Management 5 min read - To properly manage risk, security analysts must understand the threats and vulnerabilities that exist on their networks and assess their consequences.
Fraud Protection March 27, 2017 Hey Phishing, You Old Foe — Catch This Cognitive Drift? 4 min read - Powered by machine learning, IBM Trusteer can help IT professionals nip phishing attacks in the bud with unprecedented speed and accuracy.
Incident Response March 24, 2017 What Is Incident Response Orchestration? 2 min read - Incident response orchestration aligns the people, processes and technology involved in responding to and mitigating cybersecurity attacks.
Incident Response March 21, 2017 Security Orchestration for an Uncertain World 5 min read - Security orchestration is the union of people, process and technology — computer automation where it works, and human coordination where it doesn't.
Threat Intelligence March 9, 2017 Showcasing Threat Intelligence at IBM InterConnect 3 min read - At InterConnect 2017, experts will demonstrate how IBM is applying Watson for Cyber Security to take threat intelligence to the next level.
Artificial Intelligence March 8, 2017 Connecting to the Future With Cognitive Security 3 min read - IT teams are beginning to adopt cognitive security solutions to enable their analysts to make connections and drive innovation in the cybersecurity space.
Cloud Security March 6, 2017 Closing Cloud Security Gaps at Every Step of the Migration Process 3 min read - When moving data and services to the cloud, IT leaders must implement cloud security measures at every step of the complex migration process.