X-Force April 16, 2015 The Path Forward With Threat Intelligence and Sharing 3 min read - Threat intelligence sharing is becoming imperative for improving organizations' security, but it needs the right collaborative approach to be successful.
Intelligence & Analytics April 7, 2015 How to Stay Up-to-Date on Security Trends 9 min read - Following news and threat information and staying up-to-date with the latest security trends can keep your organization and your customers secure.
April 2, 2015 Threat Intelligence Report: CIOs and Others Need to Think Smarter About Security 2 min read - A threat intelligence report prepared for the U.K. government suggests IT professionals need better information to protect against cybercriminals.
Intelligence & Analytics April 1, 2015 The Power of Community Defense: Using a Combination of Threat Intelligence, Information Sharing and Open Standards 2 min read - Using community defense, organizations can band together to promote increased information sharing to alert others about potentially dangerous threats.
Endpoint February 23, 2015 Creating a Security Strategy to Stay Ahead of Targeted Attacks and Advanced Threats 3 min read - Organizations must keep threat intelligence in mind when crafting a security strategy meant to protect them against increasingly sophisticated threats.
Advanced Threats February 4, 2015 Q&A With Dr. Char Sample: What Is Attribution and How Can It Help Fight Attackers? 4 min read - Dr. Char Sample sat down with IBM's Diana Kelley to discuss the topic of attribution and how it can help organizations fight off cyberattackers.
Intelligence & Analytics November 4, 2014 Dynamic Security for the Hybrid Cloud: Cloud Is the New Data Center 2 min read - As more organizations adopt the cloud, companies should prioritize their cloud security to keep their critical data safe from cybercriminals.
X-Force August 25, 2014 Why Heartbleed Still Matters: Hindsight in the Age of Pervasive Exploits 4 min read - The latest IBM X-Force Threat Intelligence Report discusses the aftermath of the Heartbleed vulnerability, what organizations can learn and improve upon.
July 30, 2014 Ransomware and Cyber Extortion: What You Need to Know and Do 3 min read - Today, cyber criminals are applying ancient approaches to modern technologies by using ransomware and cyber extortion to demand money from victims.