Intelligence & Analytics September 24, 2018 Customer Focus Drives Leadership in SIEM, Security Analytics 2 min read - We've seen many changes in the SIEM and security analytics space over the last decade, but throughout that time, IBM QRadar has consistently innovated and led the market in addressing new threats.
Intelligence & Analytics September 24, 2018 What Metrics Do You Need to Measure the Success of Your SOC? 5 min read - Your SOC collects mounds of data every day, but not all of it will contribute to a useful, relevant analysis of its performance. What metrics do you need to measure the success of your SOC?
Threat Hunting September 12, 2018 A Beginner’s Guide to Threat Hunting 3 min read - Threat hunting is a complex and labor-intensive task, but it can go a long way toward helping your organization detect APTs before they can cause damage to the network.
Intelligence & Analytics September 7, 2018 Not Your Grandfather’s SIEM: 5 Signs That You Should Reconsider Your Current SIEM Deployment < 1 min read - Security ecosystems and threat hunting techniques have evolved since the introduction of SIEM more than 15 years ago. Is your security intelligence strategy up to date?
Intelligence & Analytics August 28, 2018 3 Key Areas of Security Operations to Benchmark and Evaluate 3 min read - SOC leaders should benchmark against speed, intelligence and accuracy to effectively measure and, ultimately, improve their security operations workflow.
Intelligence & Analytics August 24, 2018 Don’t Risk It: Why You Shouldn’t Assume All Cybersecurity Solutions Are Based on Standards 2 min read - There is no governing board or standard for cybersecurity solutions, so you can't assume all products of a given type are either equal or interchangeable.
Incident Response August 13, 2018 How to Defend With the Courses of Action Matrix and Indicator Lifecycle Management 5 min read - The lifecycle management of indicators is an important element to support decisions and actions against attackers. This process informs the courses of action matrix to build a response plan.
August 13, 2018 Malicious Email Payloads Increased in Volume and Diversity in Q2 2018 2 min read - A quarterly threat report revealed that malicious email attacks increased by 36 percent and delivered more diverse payloads in Q2 2018.
Threat Hunting August 10, 2018 Know Your Enemy: How to Build a Successful Threat Hunting Program 3 min read - To build a successful threat hunting program, you must thoroughly understand who might attack your organization, what these malicious actors might be after and what tactics they'll use to get it.
August 9, 2018 Massive Router Attack Injects CoinHive Malware Using Winbox Bug 2 min read - A new router attack targeting MikroTik devices exploits a Winbox bug to install CoinHive malware and create backdoors.