Intelligence & Analytics June 1, 2015 Comparing Free Online Malware Analysis Sandboxes 6 min read - Free malware analysis sandboxes can be used as a means of enhancing cybersecurity without a major drain on time, money and other resources.
May 21, 2015 Security Analytics Gets Top Marks but Low Numbers — What Gives? 2 min read - Security analytics gets top marks from IT pros but scores low in penetration. What's preventing this new technology from gaining ground?
Threat Intelligence May 19, 2015 Perimeter Protection Is Not Enough 3 min read - IBM X-Force Exchange is giving organizations a safe, anonymous way to share intelligence to move beyond simple perimeter protection.
Threat Intelligence May 18, 2015 How to Build an IDMS for Automated Infection Validation 2 min read - Building an intelligent decision-making system for automated infection validation requires the input of data scientists, security resources and more.
X-Force May 14, 2015 From the Dark Web to Your Data: Uncovering the Life of a Cyberthreat With Community Knowledge 2 min read - IBM's X-Force Exchange emphasizes collaboration and intelligence sharing, using strategies used in the Dark Web to promote security and defeat criminals.
Threat Intelligence May 8, 2015 Threat Kinetics: The Arms Race Between Black Hat and White Hat Developers 3 min read - The evolution of threat kinetics to identity kinetics is rapidly advancing, and there are a plethora of organizations pursuing this avenue.
Intelligence & Analytics May 7, 2015 Threat Intelligence Collaboration Leads to More Efficient, Comprehensive Cybersecurity 8 min read - Multilayered exchanges focused on shared threat intelligence can work to identify, stop and prevent security attacks, limiting the resulting damage.
Malware May 4, 2015 Malware Patient Zeros: How Threat Intelligence and Herd Immunity Can Help Prevent the Spread of Infections 4 min read - Organizations can borrow lessons from the medical industry and use herd immunity and information sharing to stop the spread of malware.
X-Force April 23, 2015 The Game Is Afoot: Threat Intelligence Spans Machines to Automate Defensive Reactions 3 min read - Defenders must share threat data and methods across organizations and industries. Threat intelligence requires a common machine-readable format.
Government April 16, 2015 Federal Cybersecurity Legislation Is on the Way — But Don’t Relax 3 min read - As cybersecurity incidents increase in frequency and severity, new legislation is being proposed to share information among organizations.