In our release of the 2020 Cost of Insider Threats report, we cover details on the cost of insider threats by industry and the tools and activities that can help reduce the risk of insider threats. The post Gaining Insight…
Category: Security Intelligence
Has Necurs Fallen From (Cybercrime) Grace? Elite Malware Botnet Now Distributes Clunky Scams
Is Necurs toppling down from its high position as a major malspam carrier for elite cybercrime gangs? The post Has Necurs Fallen From (Cybercrime) Grace? Elite Malware Botnet Now Distributes Clunky Scams appeared first on Security Intelligence. Advertise on…
Are More Defined Parameters the Key to Addressing the Cybersecurity Skills Gap?
Is an inability to define security the main cause of the cybersecurity skills gap? If we can’t truly define what security is, how can organizations design the right cybersecurity jobs for their needs? The post Are More Defined Parameters the…
Scaling Security in Software Development: The Art of Possible
What are the options for an organization that wants to take security in software development seriously? Here’s what to know. The post Scaling Security in Software Development: The Art of Possible appeared first on Security Intelligence. Advertise on IT…
What Is Threat Management? Common Challenges and Best Practices
Threat management is a framework often used by cybersecurity professionals to manage the life cycle of a threat in an effort to identify and respond to it with speed and accuracy. The post What Is Threat Management? Common Challenges and…
A Complete Guide to Hacking the 2020 RSA Conference
The 2020 RSA Conference is just around the corner. Here’s how to plan for the enormous cybersecurity conference with over 500 sessions, and 8 things you can’t miss this year. The post A Complete Guide to Hacking the 2020 RSA…
Head in the Clouds: Scaling Business Workloads Without Scaling Risk
The domains of cloud computing have been evolving rapidly, galloping forward to meet the business needs of an industry that relies on data more than ever before. The post Head in the Clouds: Scaling Business Workloads Without Scaling Risk appeared…
Which Incident Response Investments Are You Prioritizing in 2020?
Developing, testing and improving incident response plans should be the number one priority for future investment by organizations, but there are more areas to look into in 2020. The post Which Incident Response Investments Are You Prioritizing in 2020? appeared…
What Are You Protecting Against? Deploying Proper Use Cases Is Critical to Build Security Maturity
Use cases play a key role in enabling organizations to focus on relevant cybersecurity defenses, but to deploy the proper use cases, businesses must understand their needs and goals. The post What Are You Protecting Against? Deploying Proper Use Cases…
Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know
Whether you’re the CEO of a multinational corporation or a college kid setting up a Gmail account, proper cybersecurity hygiene should be as essential as understanding the rules of the road. The post Are You Smarter Than a Jeopardy GOAT?…
Spear Phishing Gets Us Nearly Every Time: Lessons From Europol’s Report
Just how susceptible are people to phishing and spear phishing? Recent reports show an increase in phishing activity and sophistication as well as greater negative impacts. The post Spear Phishing Gets Us Nearly Every Time: Lessons From Europol’s Report appeared…
New NetWire RAT Campaigns Use IMG Attachments to Deliver Malware Targeting Enterprise Users
IBM X-Force researchers have discovered a new campaign targeting organizations with fake business emails that deliver NetWire remote-access Trojan (RAT) variants. The post New NetWire RAT Campaigns Use IMG Attachments to Deliver Malware Targeting Enterprise Users appeared first on Security…
The Charm of Security-Driven Data Lake Architecture
To keep up with today’s threats, organizations need a way to correlate and analyze data over a longer period of time. Security-driven data lake architecture might just be the answer. The post The Charm of Security-Driven Data Lake Architecture appeared…
Enter Dustman: New Wiper Takes After ZeroCleare, Targets Organizations in Saudi Arabia
To understand the similarities between ZeroCleare and Dustman, IBM X-Force researchers took a closer look at their code and the files being used in attacks. The post Enter Dustman: New Wiper Takes After ZeroCleare, Targets Organizations in Saudi Arabia appeared…
What Is AI and How Can It Improve an Organization’s Security Posture?
AI can be used to supplement the efforts of security analysts and significantly reduce the time it takes to investigate and remediate threats. The post What Is AI and How Can It Improve an Organization’s Security Posture? appeared first on…
3 Steps to Find the Right Digital Transformation Strategy for You
The most important part of any digital transformation strategy is figuring out what’s right for your organization. Here is a three-step process that can serve as a basic road map to figure that out. The post 3 Steps to Find…
How Do We Ensure the Security of What Comes After the 5G Revolution?
2020 will see huge investments in 5G networks, but what will the next telecommunication revolution look like? And how do we ensure this system is safe and secure? The post How Do We Ensure the Security of What Comes After…
9 Reasons Why Cybersecurity Stress Is an Industry Epidemic
Learn why a security career may carry above-average risks of occupational stress, and how CISOs should respond before cybersecurity stress threatens employee well-being or enterprise security risks. The post 9 Reasons Why Cybersecurity Stress Is an Industry Epidemic appeared first…
3 Lessons From the Incident Response Tabletops
Here are three lessons I’ve learned about incident response from having run tabletop exercises within IBM and alongside our clients. The post 3 Lessons From the Incident Response Tabletops appeared first on Security Intelligence. Advertise on IT Security News.…
Is Juice Jacking a Legitimate Threat or Nothing to Worry About?
Juice jacking is either a rare or currently unpracticed attack that’s brimming with potential for cybercriminals and spies. The post Is Juice Jacking a Legitimate Threat or Nothing to Worry About? appeared first on Security Intelligence. Advertise on IT…
3 Multicloud Security Considerations for the Modern Enterprise
Organizations that are moving to multiple hybrid clouds can boost their cloud security posture with a centralized method for tracking all the critical aspects of multicloud environments. The post 3 Multicloud Security Considerations for the Modern Enterprise appeared first on…
How Digital Natives Are Shaping the Future of Data Privacy
Our collective attitude toward sharing is changing as we learn more about how maintaining data privacy is both desirable and difficult. The post How Digital Natives Are Shaping the Future of Data Privacy appeared first on Security Intelligence. Advertise…
From Mega to Giga: Cross-Version Comparison of Top MegaCortex Modifications
MegaCortex seems to be looking for ways to improve, and with each version upgrading the previous release’s functions, our team took a closer look at some of the highlights. The post From Mega to Giga: Cross-Version Comparison of Top MegaCortex…
Looking Back on a Year of (Unexpected) Security Keynote Speeches
As wide-ranging as the security keynote speeches I heard last year were, almost all had a similar message: We’re overwhelmed by threats that, if left unanswered, could take down our institutions. The post Looking Back on a Year of (Unexpected)…
Containers in the Cloud: False Assumptions and Security Challenges
Strengthening container security in the cloud starts with addressing the misconception that containers automatically provide security for the applications inside them. The post Containers in the Cloud: False Assumptions and Security Challenges appeared first on Security Intelligence. Advertise on…
What Is the Biggest Challenge Facing Endpoint Security? Hint: It’s Not Malware
Comprehensive UEM solutions centrally support capabilities for data collection, reporting and alarming, data analysis, and automated response that are the hallmark of responsible endpoint security. The post What Is the Biggest Challenge Facing Endpoint Security? Hint: It’s Not Malware appeared…
Make These Security New Year’s Resolutions to Bolster Your Cybersecurity in 2020
2020 is here. Toss any bad habits and take on new goals this year by identifying critical outcomes, defining key metrics and implementing your security New Year’s resolutions step-by-step. The post Make These Security New Year’s Resolutions to Bolster Your…