When I was new to this industry, I firmly believed that insider threats occurred because people didn’t know how to be safe online. The post We Need More Than Security Awareness to Combat Insider Threats appeared first on Security Intelligence.…
Category: Security Intelligence
3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020
The biggest takeaway from observing 2019 trends is that being proactive and having a data privacy strategy in place is important to help mitigate the risk of a data privacy breach. The post 3 Trends in Data Privacy Breach Laws…
X-Force Threat Intelligence Index Reveals Top Cybersecurity Risks of 2020
The findings in the 2020 X-Force Threat Intelligence Index highlight the most common attack vectors, the evolution of ransomware and malware, the risks posed by inadvertent insiders and more. The post X-Force Threat Intelligence Index Reveals Top Cybersecurity Risks of…
How to Create Value With Your (Security) Data Analytics Program
The key factor in the success of any data analytics program, security-focused or otherwise, is how efficient and business-fit the underlying data architecture is. The post How to Create Value With Your (Security) Data Analytics Program appeared first on Security…
What Leadership Qualities for CISOs Are Most Important in 2020?
Leadership qualities for CISOs continue to evolve in the direction of what’s being asked of top-level business executives. The post What Leadership Qualities for CISOs Are Most Important in 2020? appeared first on Security Intelligence. Advertise on IT Security…
Biased AI Is Another Sign We Need to Solve the Cybersecurity Diversity Problem
Biased AI can be trained to reflect narrow human perspectives on risk. It’s time to solve our diversity problem and create teams with varied perspectives to minimize AI bias. The post Biased AI Is Another Sign We Need to Solve…
Artificial Intelligence (AI) and Security: A Match Made in the SOC
When security analysts partner with artificial intelligence, the benefits include increased productivity, improved job satisfaction, and streamlined threat detection, investigation and response. The post Artificial Intelligence (AI) and Security: A Match Made in the SOC appeared first on Security Intelligence.…
Emotet Activity Rises as It Uses Coronavirus Scare to Infect Targets in Japan
IBM X-Force has identified a spam campaign targeting users in Japan that employs the Coronavirus scare as a lure to encourage people to open malicious emails. The post Emotet Activity Rises as It Uses Coronavirus Scare to Infect Targets in…
How Deepfakes Will Make Us Question Everything in 2020
If anyone can claim that what they said was the result of a deepfake, how can we distinguish the truth anymore? The post How Deepfakes Will Make Us Question Everything in 2020 appeared first on Security Intelligence. Advertise on…
CamuBot Resurfaces With Cross-Channel, Targeted Attacks in Brazil
Recent CamuBot activity resurfaced exactly one year after IBM X-Force researchers made the initial discovery of this malware in September 2018. The post CamuBot Resurfaces With Cross-Channel, Targeted Attacks in Brazil appeared first on Security Intelligence. Advertise on IT…
How Do You Measure the Success of Your Patch Management Efforts?
With the recent shift in attack focus toward operating systems and the increase in publicized breaches and ransomware attacks, patch management is now essential for organizations. The post How Do You Measure the Success of Your Patch Management Efforts? appeared…
The Case for Integrating Dark Web Intelligence Into Your Daily Operations
Some of the best intelligence a decision-maker can obtain comes straight from the belly of the beast. That’s why dark web intelligence can be incredibly valuable to your security operations center. The post The Case for Integrating Dark Web Intelligence…
Why 2020 Will Be the Year Artificial Intelligence Stops Being Optional for Security
Artificial intelligence is being built into security tools and services of all kinds, so it’s time to change our thinking around AI’s role in enterprise security. The post Why 2020 Will Be the Year Artificial Intelligence Stops Being Optional for…
Gaining Insight Into the Ponemon Institute’s 2020 Cost of Insider Threats Report
In our release of the 2020 Cost of Insider Threats report, we cover details on the cost of insider threats by industry and the tools and activities that can help reduce the risk of insider threats. The post Gaining Insight…
Has Necurs Fallen From (Cybercrime) Grace? Elite Malware Botnet Now Distributes Clunky Scams
Is Necurs toppling down from its high position as a major malspam carrier for elite cybercrime gangs? The post Has Necurs Fallen From (Cybercrime) Grace? Elite Malware Botnet Now Distributes Clunky Scams appeared first on Security Intelligence. Advertise on…
Are More Defined Parameters the Key to Addressing the Cybersecurity Skills Gap?
Is an inability to define security the main cause of the cybersecurity skills gap? If we can’t truly define what security is, how can organizations design the right cybersecurity jobs for their needs? The post Are More Defined Parameters the…
Scaling Security in Software Development: The Art of Possible
What are the options for an organization that wants to take security in software development seriously? Here’s what to know. The post Scaling Security in Software Development: The Art of Possible appeared first on Security Intelligence. Advertise on IT…
What Is Threat Management? Common Challenges and Best Practices
Threat management is a framework often used by cybersecurity professionals to manage the life cycle of a threat in an effort to identify and respond to it with speed and accuracy. The post What Is Threat Management? Common Challenges and…
A Complete Guide to Hacking the 2020 RSA Conference
The 2020 RSA Conference is just around the corner. Here’s how to plan for the enormous cybersecurity conference with over 500 sessions, and 8 things you can’t miss this year. The post A Complete Guide to Hacking the 2020 RSA…
Head in the Clouds: Scaling Business Workloads Without Scaling Risk
The domains of cloud computing have been evolving rapidly, galloping forward to meet the business needs of an industry that relies on data more than ever before. The post Head in the Clouds: Scaling Business Workloads Without Scaling Risk appeared…
Which Incident Response Investments Are You Prioritizing in 2020?
Developing, testing and improving incident response plans should be the number one priority for future investment by organizations, but there are more areas to look into in 2020. The post Which Incident Response Investments Are You Prioritizing in 2020? appeared…
What Are You Protecting Against? Deploying Proper Use Cases Is Critical to Build Security Maturity
Use cases play a key role in enabling organizations to focus on relevant cybersecurity defenses, but to deploy the proper use cases, businesses must understand their needs and goals. The post What Are You Protecting Against? Deploying Proper Use Cases…
Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know
Whether you’re the CEO of a multinational corporation or a college kid setting up a Gmail account, proper cybersecurity hygiene should be as essential as understanding the rules of the road. The post Are You Smarter Than a Jeopardy GOAT?…
Spear Phishing Gets Us Nearly Every Time: Lessons From Europol’s Report
Just how susceptible are people to phishing and spear phishing? Recent reports show an increase in phishing activity and sophistication as well as greater negative impacts. The post Spear Phishing Gets Us Nearly Every Time: Lessons From Europol’s Report appeared…
New NetWire RAT Campaigns Use IMG Attachments to Deliver Malware Targeting Enterprise Users
IBM X-Force researchers have discovered a new campaign targeting organizations with fake business emails that deliver NetWire remote-access Trojan (RAT) variants. The post New NetWire RAT Campaigns Use IMG Attachments to Deliver Malware Targeting Enterprise Users appeared first on Security…
The Charm of Security-Driven Data Lake Architecture
To keep up with today’s threats, organizations need a way to correlate and analyze data over a longer period of time. Security-driven data lake architecture might just be the answer. The post The Charm of Security-Driven Data Lake Architecture appeared…
Enter Dustman: New Wiper Takes After ZeroCleare, Targets Organizations in Saudi Arabia
To understand the similarities between ZeroCleare and Dustman, IBM X-Force researchers took a closer look at their code and the files being used in attacks. The post Enter Dustman: New Wiper Takes After ZeroCleare, Targets Organizations in Saudi Arabia appeared…
What Is AI and How Can It Improve an Organization’s Security Posture?
AI can be used to supplement the efforts of security analysts and significantly reduce the time it takes to investigate and remediate threats. The post What Is AI and How Can It Improve an Organization’s Security Posture? appeared first on…
3 Steps to Find the Right Digital Transformation Strategy for You
The most important part of any digital transformation strategy is figuring out what’s right for your organization. Here is a three-step process that can serve as a basic road map to figure that out. The post 3 Steps to Find…
How Do We Ensure the Security of What Comes After the 5G Revolution?
2020 will see huge investments in 5G networks, but what will the next telecommunication revolution look like? And how do we ensure this system is safe and secure? The post How Do We Ensure the Security of What Comes After…
9 Reasons Why Cybersecurity Stress Is an Industry Epidemic
Learn why a security career may carry above-average risks of occupational stress, and how CISOs should respond before cybersecurity stress threatens employee well-being or enterprise security risks. The post 9 Reasons Why Cybersecurity Stress Is an Industry Epidemic appeared first…
3 Lessons From the Incident Response Tabletops
Here are three lessons I’ve learned about incident response from having run tabletop exercises within IBM and alongside our clients. The post 3 Lessons From the Incident Response Tabletops appeared first on Security Intelligence. Advertise on IT Security News.…
Is Juice Jacking a Legitimate Threat or Nothing to Worry About?
Juice jacking is either a rare or currently unpracticed attack that’s brimming with potential for cybercriminals and spies. The post Is Juice Jacking a Legitimate Threat or Nothing to Worry About? appeared first on Security Intelligence. Advertise on IT…
3 Multicloud Security Considerations for the Modern Enterprise
Organizations that are moving to multiple hybrid clouds can boost their cloud security posture with a centralized method for tracking all the critical aspects of multicloud environments. The post 3 Multicloud Security Considerations for the Modern Enterprise appeared first on…
How Digital Natives Are Shaping the Future of Data Privacy
Our collective attitude toward sharing is changing as we learn more about how maintaining data privacy is both desirable and difficult. The post How Digital Natives Are Shaping the Future of Data Privacy appeared first on Security Intelligence. Advertise…
From Mega to Giga: Cross-Version Comparison of Top MegaCortex Modifications
MegaCortex seems to be looking for ways to improve, and with each version upgrading the previous release’s functions, our team took a closer look at some of the highlights. The post From Mega to Giga: Cross-Version Comparison of Top MegaCortex…
Looking Back on a Year of (Unexpected) Security Keynote Speeches
As wide-ranging as the security keynote speeches I heard last year were, almost all had a similar message: We’re overwhelmed by threats that, if left unanswered, could take down our institutions. The post Looking Back on a Year of (Unexpected)…
Containers in the Cloud: False Assumptions and Security Challenges
Strengthening container security in the cloud starts with addressing the misconception that containers automatically provide security for the applications inside them. The post Containers in the Cloud: False Assumptions and Security Challenges appeared first on Security Intelligence. Advertise on…
What Is the Biggest Challenge Facing Endpoint Security? Hint: It’s Not Malware
Comprehensive UEM solutions centrally support capabilities for data collection, reporting and alarming, data analysis, and automated response that are the hallmark of responsible endpoint security. The post What Is the Biggest Challenge Facing Endpoint Security? Hint: It’s Not Malware appeared…
Make These Security New Year’s Resolutions to Bolster Your Cybersecurity in 2020
2020 is here. Toss any bad habits and take on new goals this year by identifying critical outcomes, defining key metrics and implementing your security New Year’s resolutions step-by-step. The post Make These Security New Year’s Resolutions to Bolster Your…