Malware June 22, 2016 GozNym: Living in America 4 min read - IBM X-Force researchers recently reported that the GozNym banking malware is executing redirection attacks on banks in the U.S.
Intelligence & Analytics June 14, 2016 Does the Security Industry Have an Immune System Problem? 3 min read - Businesses need to build a cybersecurity immune system where various parts interact and work together to detect, prevent and eradicate breaches.
Threat Intelligence June 14, 2016 Threat Intelligence Currency in the API Economy 3 min read - Threat intelligence is a critical source of information that can enrich most security products and defensive strategies.
Government June 9, 2016 Botnet Detection Advances With the Use of Big Data Analysis in Europe 3 min read - The European Union is embracing new methods of botnet detection to fight cybercrime and improve the security of member nations.
June 6, 2016 Another SWIFT Attack Speeds Worry About Response — and Responsibility 2 min read - News of another SWIFT attack has the network and banks arguing about incident response — and disagreeing about with whom the responsibility lies.
May 24, 2016 SWIFT Taps Users to Fast-Track Cyberfraud Fight 2 min read - Financial network SWIFT is hoping users will help with threat information sharing and collaboration in an effort to curb cyberfraud.
Advanced Threats May 24, 2016 Q1 2016 Saw a Record High for Ransomware 4 min read - The first quarter of 2016 had a record high for ransomware infections, highlighting the need for better backup and restoration strategies.
Advanced Threats May 16, 2016 Hacktivism: Fearmongering or Real Threat? 3 min read - Organizations must be prepared for possible hacktivism campaigns by arming themselves with the best defensive tools and security strategies.
May 16, 2016 Collaboration Key to Driving Security Innovation in Energy and Utilities Sector 2 min read - IBM and Samsung have entered a partnership that will prioritize driving security innovation throughout the energy and utilities industry.
Intelligence & Analytics May 4, 2016 How Black Hats and White Hats Collaborate to Be Successful 8 min read - There are many types of hackers, but under certain circumstances both black hats and white hats may collaborate to reach a common goal.