Software Vulnerabilities May 1, 2019 Penetration Testing Versus Red Teaming: Clearing the Confusion 6 min read - There is some confusion in cybersecurity as to the difference between penetration testing and red teaming. Since all businesses have vastly different security needs, the distinction is critical.
CISO April 25, 2019 Set Expectations and Boundaries With Your Security Program to Minimize Risk 3 min read - Good communication, clear expectations and enforced boundaries are all key to the success of your security program.
Intelligence & Analytics April 23, 2019 How IBM X-Force IRIS Prepared for the Ukraine Election 7 min read - Before the first round of the Ukraine election in March, we decided that we couldn't afford to sit on our heels until an attack was launched.
April 18, 2019 Attackers Compromise Admin Account to Infect Manufacturing Company With BitPaymer Ransomware 2 min read - Threat actors compromised an account with administrator privileges to infect a manufacturing company with BitPaymer ransomware.
CISO April 18, 2019 In Such Transformative Times, the CISO Is Key to Delivering Digital Trust 5 min read - Ensuring organizations adapt while also retaining a high level of digital trust is exactly where the chief information security officer (CISO) can help.
Intelligence & Analytics April 18, 2019 Level Up Security Operations With Threat Intelligence Cheat Codes 4 min read - Like the video game industry, security has shifted toward unified platforms, and contextual threat intelligence is the cheat code SOC teams need to defeat the bosses standing in the way of security.
Intelligence & Analytics April 12, 2019 What Is the Role of SIEM in the Fusion Center Era? 3 min read - A fusion center uses a wider set of data sources, collects data from both inside and outside the organization, and delivers it to the right people to help them respond and recover more efficiently.
CISO April 11, 2019 Cyber Resilience Study: Incident Response Plans and Security Automation Set High Performers Apart 3 min read - The fourth annual "The Cyber Resilience Organization" study found that 23 percent of respondents are now using security automation.
Incident Response April 9, 2019 SOAR: The Second Arm of Security Operations 4 min read - SIEM tools can help security operations center (SOC) teams detect threats, but what good is threat data without the context analysts need to quickly respond to incidents? That's where SOAR comes in.
Incident Response April 5, 2019 Why Cyber Range Training Should Be Top of Mind for Your Security Teams 3 min read - When reputation, revenue and customer trust is at stake, immersive cyber range training can help security teams detect, respond and manage incidents effectively.