Endpoint November 7, 2018 How to Reduce Hidden Endpoint Management Costs and Increase Efficiency 5 min read - To reduce hidden endpoint management costs, look for solutions that give you comprehensive visibility into your endpoint landscape and enable you to consolidate tools and increase efficiency.
Intelligence & Analytics October 18, 2018 Orchestrating Incident Response Beyond Triage and Enrichment 2 min read - Incident response orchestration can help security teams transform response across the entire incident life cycle, including automating remedial actions and mitigating future attacks.
Intelligence & Analytics October 16, 2018 Simplify Your Security With an Open Cloud-Based Platform 3 min read - Today, we're announcing IBM Security Connect, an open, cloud-based platform that is capable of analyzing federated security data across unconnected tools and environments.
Threat Intelligence October 12, 2018 An Increase in PowerShell Attacks: Observations From IBM X-Force IRIS 9 min read - Since the open source release of the PowerShell framework in 2016, IBM X-Force Incident Response and Intelligence Services (IRIS) has identified an upward trend in malicious PowerShell use.
Data Protection October 3, 2018 The Wild West of Data Risk Management in the Age of Cloud, Mobile and Digital Transformation 3 min read - In today's rapidly evolving security environment, it's imperative for organizations to establish a formal data risk management program that does more than just check the boxes.
Identity & Access September 26, 2018 Protect Your ‘Matrix’ With Strong Privileged Access Management 5 min read - "The Matrix" shows the damage that a rogue actor can cause by gaining privileged access to a digital environment. Privileged access management tools can help security teams keep their networks secure.
Intelligence & Analytics September 24, 2018 Customer Focus Drives Leadership in SIEM, Security Analytics 2 min read - We've seen many changes in the SIEM and security analytics space over the last decade, but throughout that time, IBM QRadar has consistently innovated and led the market in addressing new threats.
Intelligence & Analytics September 24, 2018 What Metrics Do You Need to Measure the Success of Your SOC? 5 min read - Your SOC collects mounds of data every day, but not all of it will contribute to a useful, relevant analysis of its performance. What metrics do you need to measure the success of your SOC?
Threat Hunting September 12, 2018 A Beginner’s Guide to Threat Hunting 3 min read - Threat hunting is a complex and labor-intensive task, but it can go a long way toward helping your organization detect APTs before they can cause damage to the network.
Intelligence & Analytics September 7, 2018 Not Your Grandfather’s SIEM: 5 Signs That You Should Reconsider Your Current SIEM Deployment < 1 min read - Security ecosystems and threat hunting techniques have evolved since the introduction of SIEM more than 15 years ago. Is your security intelligence strategy up to date?