Read the original article: When Your Heartbeat Becomes Data: Benefits and Risk of Biometrics Knowing who your users are today is more important than ever. This explains, in part, why integrating biometric usage into identity and access management (IAM) appears…
Tag: Security Intelligence
Digital Transformation: Breaking Down Silos for Better Data Security
Read the original article: Digital Transformation: Breaking Down Silos for Better Data Security Today, enterprises are under pressure to improve the power and reduce the cost of running mission-critical business applications by migrating to modern software architectures. By breaking down…
Your Newest Cybersecurity Professional Is Already in Your Company
Read the original article: Your Newest Cybersecurity Professional Is Already in Your Company The cybersecurity talent gap is real. The 2019/2020 Official Annual Cybersecurity Jobs Report predicts that there will be 3.5 million security jobs left unfilled globally by 2021.…
New Vulnerability Could Put IoT Devices at Risk
Read the original article: New Vulnerability Could Put IoT Devices at Risk Society relies so heavily on technology that the number of internet connected devices used globally is predicted to grow to 55.9 billion by 2025. Many of these devices…
Don’t Remove Stalkerware Before Reading This Article
Read the original article: Don’t Remove Stalkerware Before Reading This Article Stalkerware is technically software with malicious intent, but security professionals should treat it as a different beast from other malware. Stalkerware is an app or apps that someone else…
UEM tackles remote work: ‘2020 Gartner Magic Quadrant for Unified Endpoint Management Tools’
Read the original article: UEM tackles remote work: ‘2020 Gartner Magic Quadrant for Unified Endpoint Management Tools’ As summer winds down, unified endpoint management (UEM) is starting to heat up. Gartner just introduced the 2020 Gartner Magic Quadrant for Unified…
How to Ensure Secure and Complete Data Destruction
Read the original article: How to Ensure Secure and Complete Data Destruction Data security means keeping data out of the wrong hands. This is especially important when storage media is no longer usable and needs to be decommissioned. The data must…
Threat Modeling in a Container Environment
Read the original article: Threat Modeling in a Container Environment As organizations turn to hybrid solutions, an increasing number of businesses are turning to container orchestration to provide a seamless solution to computing between environments. “Containers are units of software in…
New Ponemon Report: A Programmatic Approach to Vulnerability Management for Hybrid Multicloud
Read the original article: New Ponemon Report: A Programmatic Approach to Vulnerability Management for Hybrid Multicloud X-Force Red is unveiling a new research study, conducted by the Ponemon Institute, that highlights vulnerability management challenges for on-premises and cloud environments: in…
Safeguarding Health Care Services During COVID-19 With Dr. Saif Abed and Dan Taylor
Read the original article: Safeguarding Health Care Services During COVID-19 With Dr. Saif Abed and Dan Taylor Health care organizations are coming under increased pressure from COVID-19. At the same time, they’re trying to expand digital services to patients and…
Legacy Systems: Seven Things to Know When Sunsetting
Read the original article: Legacy Systems: Seven Things to Know When Sunsetting Nothing lasts forever. That’s true for cars, devices, even a favorite sweatshirt or pair of jeans. But it is especially true for information technology (IT). Legacy IT systems…
Help Reinforce Privacy Through the Lens of GDPR
Read the original article: Help Reinforce Privacy Through the Lens of GDPR The General Data Protection Regulation (GDPR) marked its two-year anniversary in May 2020 as one of the “toughest privacy and security” regulations, according to the European Union. GDPR…
Questions to Ask When Conducting Single Sign-On Enrollment
Read the original article: Questions to Ask When Conducting Single Sign-On Enrollment Instead of asking employees to input passwords every day, single sign-on (SSO) offers a simplified but secure authentication process. SSO authentication gives a user the option of choosing…
Data Democratization: Balancing Risk vs Reward Through Data Governance
Read the original article: Data Democratization: Balancing Risk vs Reward Through Data Governance Expanding employees’ access to the company’s data, known as data democratization, can be controversial. A more open attitude to data within the enterprise can give people the…
Vendor Management: 7 Tips for Security During Remote Work
Read the original article: Vendor Management: 7 Tips for Security During Remote Work Third-party vendor management can be a risk to an organization’s data and network security. Enterprises depend on vendors to use security best practices that meet company standards…
Loving the Algorithm: User Risk Management and Good Security Hygiene
Read the original article: Loving the Algorithm: User Risk Management and Good Security Hygiene User risk management watches where people can’t. If you polled a random sampling of employees at various organizations, most would probably consider themselves security-minded. They would…
Cloud IAM and the Path Toward Digital Transformation
Read the original article: Cloud IAM and the Path Toward Digital Transformation By 2022, 40% of global midsize and larger organizations will use identity and access management (IAM) capabilities delivered as software-as-a-service (SaaS) to fulfill most of their needs, cites…
Security Modernization for the Cloud
Read the original article: Security Modernization for the Cloud This is the first in a blog series that will focus on all phases of security delivery: design, dev/build, test, deploy, operate and learn. Many organizations are facing new cybersecurity concerns…
Endpoint Security Using AI & MITRE For Your Remote Workforce
Read the original article: Endpoint Security Using AI & MITRE For Your Remote Workforce As employees increasingly work remotely, it is more important than ever to maintain visibility and threat detection in a remote working world. We have seen a…
Shellshock In-Depth: Why This Old Vulnerability Won’t Go Away
Read the original article: Shellshock In-Depth: Why This Old Vulnerability Won’t Go Away Shellshock is a bug in the Bash command-line interface shell that has existed for 30 years and was discovered as a significant threat in 2014. Today, Shellshock…
Threat Hunting Techniques: A Quick Guide
Read the original article: Threat Hunting Techniques: A Quick Guide Threat hunting is an essential part of security operations center services and should be incorporated at an early stage. Threat hunting is the art of finding the unknowns in the…
Defending the Oil and Gas Industry Against Cyber Threats
Read the original article: Defending the Oil and Gas Industry Against Cyber Threats The oil and gas industry is one of the most powerful financial sectors in the world, critical to global and national economies. Therefore, this industry is a…
Measuring Effectiveness Across Globally Connected Security Operations Centers
Read the original article: Measuring Effectiveness Across Globally Connected Security Operations Centers What’s it like to measure and optimize global security operations centers (SOCs)? Measuring a SOC is a bit like the operating the performance of a machine or a…
Measuring Security Operations Center Effectiveness Globally
Read the original article: Measuring Security Operations Center Effectiveness Globally Do you know what is it like to measure and optimize global security operations centers (SOCs)? At IBM Managed Security Services’ (MSS), we measure an SOC a bit like operating…
6 Ransomware Trends You Should Watch for in 2020
Read the original article: 6 Ransomware Trends You Should Watch for in 2020 A ransomware infection can have a significant financial impact on an organization. American digital security and data backup firm Datto found that ransomware is costing businesses more…
How Employing Encryption for Data Security Changed History
Read the original article: How Employing Encryption for Data Security Changed History Human history is full of examples of encryption playing pivotal roles in war, competition and transitions of power. Throughout recorded time, people have employed encryption as a tactical tool…
Build a Roadmap for Cyber Resilience
Read the original article: Build a Roadmap for Cyber Resilience The current information security landscape is rapidly evolving. According to the latest research from IBM Security and the Ponemon Institute’s 2020 Cyber Resilient Organization Report, 67% of organizations reported that…
DDoS Attacks Increase in Size, Frequency and Duration
Read the original article: DDoS Attacks Increase in Size, Frequency and Duration Distributed denial of service (DDoS) attacks are increasing in size, frequency and duration. Kaspersky Lab reported a doubling of DDoS attacks in the first quarter of 2020 compared…
Enhance Integrated Risk Management Solutions With Modern Technologies
Read the original article: Enhance Integrated Risk Management Solutions With Modern Technologies Many business leaders struggle to efficiently respond to risk and compliance needs because of the complex regulatory landscape, ever-evolving risk scenarios and inconsistent internal processes. It’s only been…
How and Why to Take a Holistic Approach to Threat Modeling
Read the original article: How and Why to Take a Holistic Approach to Threat Modeling By taking a broader, more expansive view of threat modeling, organizations can consider the whole picture of their security strategy and improve efficiency. Threat modeling…
What’s New in the 2020 Cost of a Data Breach Report
Read the original article: What’s New in the 2020 Cost of a Data Breach Report In a world of uncertainty and change, it’s a comfort that some things are consistent year after year. Now in its 15th year, the annual…
Darknet Cybersecurity: How Finance Institutions Can Defend Themselves
Read the original article: Darknet Cybersecurity: How Finance Institutions Can Defend Themselves Financial firms continue to move to digital-first deployments, as retail branches close, and people shift to remote work. This shift makes understanding and preventing even common darknet, or…
All-in-one MSS is the Future — Are You Ready?
Read the original article: All-in-one MSS is the Future — Are You Ready? Managed security service providers (MSSPs) can speed up detection and response capabilities in complex, distributed security environments. However, many traditional managed security providers simply act as alert…
Aviation Can Anticipate an Increase in State-Sponsored Activity
Read the original article: Aviation Can Anticipate an Increase in State-Sponsored Activity The combination of lockdown measures, travel restrictions and stalling demand brought on by COVID-19 has caused an unprecedented collapse in the global air transport industry. Facing a projected…
5 Core Tenets for Effective Multicloud Security
Read the original article: 5 Core Tenets for Effective Multicloud Security For a growing number of organizations adopting cloud-based deployment models, the cloud security challenge is clear. For example, how do I rapidly transform my business in a way that is…
Leveraging Open Source Can be Powerful for Cybersecurity
Read the original article: Leveraging Open Source Can be Powerful for Cybersecurity Security vendors and end users have access to the same technology and resources, if not more, than the threat actor community. However, the area where cybersecurity falls short…
Securing Travel and Transportation Operations
Read the original article: Securing Travel and Transportation Operations Transportation networks are foundational to our modern way of life. The current restrictions on global movement and the corresponding reduction in demand for travel and transportation services, while profound, are temporary. Forecasting…
4 Steps to Help You Plan a Cyber Resilience Roadmap
Read the original article: 4 Steps to Help You Plan a Cyber Resilience Roadmap What is cyber resilience? According to IBM Security’s 2020 Cyber Resilient Organization Report, a cyber resilient organization is one that “more effectively prevents, detects, contains and…
Why Cyber Ranges Are Effective To Train Your Teams
Read the original article: Why Cyber Ranges Are Effective To Train Your Teams Cyber ranges may be one of the most effective ways to train IT professionals in defending against cyber attacks. The virtual environments deliver simulated real-world attacks that…
What Are Insider Threats and How Can You Mitigate Them?
Read the original article: What Are Insider Threats and How Can You Mitigate Them? There are several types of insider threats that organizations should be aware of and each presents different symptoms for security teams to diagnose. The post What…
Mitigating Container Risk Requires a Comprehensive Approach
Read the original article: Mitigating Container Risk Requires a Comprehensive Approach Containers have become a staple among large banks and financial services firms, which have used the technology in production. It has captured the attention of the broader market, that…
#TwitterHack: Power, Privilege and Pandemic
Read the original article: #TwitterHack: Power, Privilege and Pandemic On Wednesday, July 15, the Twitterverse was ablaze with what Twitter itself has described as a “coordinated social engineering attack” that was launched at around 4pm ET. The outcome of this…
Mitigating Containers Risk Requires a Comprehensive Approach
Read the original article: Mitigating Containers Risk Requires a Comprehensive Approach Containers have become a staple among large banks and financial services firms, which have used the technology in production. It has captured the attention of the broader market, that…
New Research Exposes Iranian Threat Group Operations
Read the original article: New Research Exposes Iranian Threat Group Operations IBM X-Force Incident Response Intelligence Services (IRIS) has uncovered rare details on the operations of the suspected Iranian threat group ITG18, which overlaps with Charming Kitten and Phosphorous. In…
Deciphering Between Incident Management and Crisis Management
Read the original article: Deciphering Between Incident Management and Crisis Management Cyber threats come in many forms and can severely impact business operations, brand reputation, financial standing and even lead to a lawsuit. Organizations must prepare to respond and manage…
Focusing on the Fundamentals of Network Security
Read the original article: Focusing on the Fundamentals of Network Security IBM X-Force has reported a huge increase in COVID-19-related spam. Malicious domains have also rapidly expanded during the first quarter of 2020. Focus on Security Fundamentals One of the…
Zero Trust in 2020: More Important Than Ever Before
Read the original article: Zero Trust in 2020: More Important Than Ever Before In a perfect world, all organizations would implement Zero Trust for its inherent security benefits. In today’s uncertain environment, every security strategy that mitigates risk is critical,…
A Quick Guide to Using the ONG-C2M2 Model
Read the original article: A Quick Guide to Using the ONG-C2M2 Model The Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (ONG-C2M2) can help oil and natural gas (ONG) organizations evaluate their cybersecurity programs and make improvements. These tools…
Securing Your Environment While Working Remotely
Read the original article: Securing Your Environment While Working Remotely Before the coronavirus pandemic hit, working from home used to be a novelty for many employees. According to a June 2020 IBM Security and Morning Consult “Work From Home Survey,”…
Securing Data in a Multicloud Environment
Read the original article: Securing Data in a Multicloud Environment The multicloud environment is becoming the standard for businesses, with 93% of organizations using this approach, according to a Flexera 2020 State of the Cloud report. The public cloud services…
Overcoming Data Security Challenges in a Hybrid, Multicloud World
Read the original article: Overcoming Data Security Challenges in a Hybrid, Multicloud World Cloud computing is evolving at a rapid pace. Today, there’s a range of choices for moving applications and data to cloud that includes various deployment models from…
Updating Legacy Systems Amid Growing Cybersecurity Concerns
Read the original article: Updating Legacy Systems Amid Growing Cybersecurity Concerns Over the past few months, a shift to remote working has raised many security questions for businesses trying to protect their data. And, ensuring that legacy systems are secure…
Future-Proofing Data With a Data Encryption Plan
Read the original article: Future-Proofing Data With a Data Encryption Plan Data volume storage needs are growing exponentially across hybrid multicloud environments. Meanwhile, companies are being faced with a greater number of regulations to follow, as well as increased exposure to…
Video Conferencing Security Tips You May Have Overlooked
Read the original article: Video Conferencing Security Tips You May Have Overlooked Video conferencing applications grew substantially following the outbreak of the coronavirus (COVID-19) global pandemic. According to Research and Markets article “Video Conferencing Demand Rises due to Social-Distancing,” video…
COVID-19 Cybercrime Capitalizing on Brazil’s Government Assistance Program
Read the original article: COVID-19 Cybercrime Capitalizing on Brazil’s Government Assistance Program IBM X-Force Incident Response and Intelligence Services (IRIS) has been tracking cybercrime capitalizing on the coronavirus pandemic since January, and has observed the geographical areas of this activity…
Why Zero-Click Cyberthreats Should Be on Your Radar
Read the original article: Why Zero-Click Cyberthreats Should Be on Your Radar For years, the statistics have told us that human error is the greatest contributor to cyberattacks. We’ve stressed the importance of training, training and more training to prevent…
How Growing Businesses Should Tackle Cybersecurity Challenges
Read the original article: How Growing Businesses Should Tackle Cybersecurity Challenges When we think about the most public cyber attacks and data breaches, we generally associate them with large enterprises. The truth is cyber attacks are not limited by company…
The Modern Workplace: Keeping Remote Workers Productive and Secure
Read the original article: The Modern Workplace: Keeping Remote Workers Productive and Secure Results from the March 30, 2020, Gartner CFO Survey indicate that 74% of businesses intend to shift some employees to permanent remote work following their initial experience…
The 2020 Cyber Resilient Organization: Preparation and Technology Differentiate High Performers
Read the original article: The 2020 Cyber Resilient Organization: Preparation and Technology Differentiate High Performers The Ponemon Institute just released its annual “The Cyber Resilient Organization” report, sponsored by IBM Security. In its fifth year, this study takes an in-depth…
These Cybersecurity Trends Could Get a Boost in 2020
Read the original article: These Cybersecurity Trends Could Get a Boost in 2020 The events of early 2020 have prompted organizations to shift priorities across the board, and security processes are no exception. While the current working environment has presented…
The Security Risks of Contactless Payment
Read the original article: The Security Risks of Contactless Payment Contactless payment first arrived in the 1990s and is now having its moment. Both companies and consumers are looking for ways to conduct business with as little physical interaction as…
Vulnerable Powerline Extenders Underline Lax IoT Security
Read the original article: Vulnerable Powerline Extenders Underline Lax IoT Security Multiple vulnerabilities have been found in Tenda PA6 Wi-Fi Powerline extender, version 1.0.1.21. This device is part of Tenda’s PH5 Powerline Extender Kit and extends the wireless network through…
An Apple a Day: Treating BYOD Pains with Apple User Enrollment
Read the original article: An Apple a Day: Treating BYOD Pains with Apple User Enrollment Even with workers returning to the office—it might be a trickle or a flood depending on the organization—the shift towards remote work is moving from just…
Visibility and Threat Detection in a Remote Working World
Read the original article: Visibility and Threat Detection in a Remote Working World At the outset of the COVID-19 pandemic, when governments around the world put stay-at-home orders in place, it was hard to imagine the state of work would…
Three Approaches to Cybersecurity Planning for Post-Pandemic Cloud Adoption
Read the original article: Three Approaches to Cybersecurity Planning for Post-Pandemic Cloud Adoption The global pandemic has been dictating how the whole world is reforming, businesses included. Different forums and analyst reports are increasingly calling out the future of businesses…
A Game of Chess: Entropy and Patterns in Threat Intelligence
Read the original article: A Game of Chess: Entropy and Patterns in Threat Intelligence During a brainstorming discussion with a colleague on the value of entropy in machine learning models, specifically the models used in threat intelligence work, I mentioned…
Ginp Malware Operations are on the Rise, Aiming to Expand in Turkey
Read the original article: Ginp Malware Operations are on the Rise, Aiming to Expand in Turkey The Ginp mobile banking malware, which emerged in late 2019, is one of the top most prevalent Android banking malware families today. It started as…
Best Practices for Managing Data Privacy & Responding to Privacy Breaches
Read the original article: Best Practices for Managing Data Privacy & Responding to Privacy Breaches A constantly changing regulatory environment has become the “new normal” for data privacy, and 2020 is no exception. The California Consumer Privacy Act (CCPA) went…
The Importance of People and Culture within the Security Operations Center
Read the original article: The Importance of People and Culture within the Security Operations Center Security operations centers (SOCs) have changed dramatically over the last decade. Gartner predicts that by 2022, 50 percent of all SOCs will transform into modern centers with…
Introducing Collaborative Automated Course of Action Operations (CACAO): An Emerging Cybersecurity Standard to Quickly Define and Share Playbooks
Read the original article: Introducing Collaborative Automated Course of Action Operations (CACAO): An Emerging Cybersecurity Standard to Quickly Define and Share Playbooks A common challenge security teams face is ensuring their organization can continue to operate despite cyber attacks — in other…
The Latest Mobile Security Threats and How to Prevent Them
Read the original article: The Latest Mobile Security Threats and How to Prevent Them For many of us, the last few months have drastically increased our reliance on mobile capabilities. Through the increased use of corporate mobile apps, virtual private…
Multifactor Authentication: The Next Battleground
Read the original article: Multifactor Authentication: The Next Battleground X-Force Incident Response and Intelligence Services (IRIS) has responded to multiple security incidents where multifactor authentication (MFA) was not implemented—but where implementing MFA might have significantly reduced the impact of the incident. Such…
The Journey to Simplicity: User Experience in Security
Read the original article: The Journey to Simplicity: User Experience in Security Keeping an organization secure is no easy task, especially with the explosion in cloud adoption and digital transformation against a backdrop of increasingly dangerous threats and threat actors.…
How Threat Actors Are Adapting to the Cloud
Read the original article: How Threat Actors Are Adapting to the Cloud With organizations increasingly moving to cloud environments, cloud security is more critical than ever. Cloud environments often hold large troves of valuable and sensitive data that can put…
Three Key Pillars of Smart Identity
Read the original article: Three Key Pillars of Smart Identity For years, identity and access management (IAM) was that painful necessity that businesses knew they had to spend time and resources on, but it was always done kind of grudgingly. Oh,…
German Task Force for COVID-19 Medical Equipment Targeted in Ongoing Phishing Campaign
Read the original article: German Task Force for COVID-19 Medical Equipment Targeted in Ongoing Phishing Campaign During the course of ongoing research on coronavirus-related cyber activity, IBM X-Force Incident Response and Intelligence Services (IRIS) uncovered a COVID-19 related phishing campaign…
Shift Your Cybersecurity Mindset to Maintain Cyber Resilience
Read the original article: Shift Your Cybersecurity Mindset to Maintain Cyber Resilience As the business world navigates the ups and downs of today’s economy, a mindset shift will be required to maintain cyber resilience. The post Shift Your Cybersecurity Mindset…
How Zero Trust Will Change Your Security Design Approach
Read the original article: How Zero Trust Will Change Your Security Design Approach How would Zero Trust change the way security solutions are designed and where does one even start when implementing Zero Trust principles into their architecture? Learn more…
It’s Time to Take a Fresh Look at Zero Trust
Read the original article: It’s Time to Take a Fresh Look at Zero Trust A convergence of trends and technologies is making Zero Trust an increasingly necessary cybersecurity strategy. The post It’s Time to Take a Fresh Look at Zero…
How Cybersecurity Leaders Can Chart the Seas of Business Communication
Read the original article: How Cybersecurity Leaders Can Chart the Seas of Business Communication As organizations manage a variety of changes this year, cybersecurity leaders can serve as pillars of stability by keeping communication on track and on point. The…
Managed Data Activity Monitoring (DAM) Is More Important Than Ever
Read the original article: Managed Data Activity Monitoring (DAM) Is More Important Than Ever Data activity monitoring (DAM) should be given strong consideration to help thwart potential data breaches and enhance security as work environments continue to evolve. The post…
What Enterprises Can Expect Following the Cyberspace Solarium Commission Report
Read the original article: What Enterprises Can Expect Following the Cyberspace Solarium Commission Report The United States Cyberspace Solarium Commission has made several recommendations for how the U.S. can strengthen its online infrastructure through government-enterprise cooperation. The post What Enterprises…
Video Conferencing Security for Businesses Isn’t a New Issue, It Just Came Into Focus
Read the original article: Video Conferencing Security for Businesses Isn’t a New Issue, It Just Came Into Focus Video conferencing has suddenly become a critical tool for businesses. Here are some tips for increased privacy and control. The post Video…
Stronger Together — Building Cyber Resilience
Read the original article: Stronger Together — Building Cyber Resilience As new ways of work are coupled with a growing prevalence of malware and ransomware, cyber resilience has become top of mind in boardrooms around the world. The post Stronger…
Advocating Security Fundamentals During and After COVID-19
Read the original article: Advocating Security Fundamentals During and After COVID-19 The COVID-19 health crisis almost instantly changed how the world works, bringing with it new security threats and challenges. As organizations work to find the path forward and emerge…
IBM Named a Leader in ‘The Forrester Wave™: Risk-Based Authentication, Q2 2020’
Read the original article: IBM Named a Leader in ‘The Forrester Wave™: Risk-Based Authentication, Q2 2020’ In today’s hybrid multicloud environment, users expect to be able to access their work and personal resources from wherever they are, whenever they need…
Measuring the Effectiveness of AI in the SOC
Read the original article: Measuring the Effectiveness of AI in the SOC Technology professionals need to be able to prove the value that any new tool brings — especially a security-focused AI one — and demonstrate the revenue gained or…
The Connection Between Cloud Service Providers and Cyber Resilience
Read the original article: The Connection Between Cloud Service Providers and Cyber Resilience Cloud service providers offer great performance and resilience, but ultimately it is up to individual organizations to determine whether these long-known advantages outweigh the possible downsides. The…
Spotting the Gray Rhinos Charging Toward Your Business Continuity Posture
Read the original article: Spotting the Gray Rhinos Charging Toward Your Business Continuity Posture Preparing for the Unpredictable There may be some elephants in the board room from time to time, but what about Black Swans or Gray Rhinos? Many…
SMBs Are Ready to Grow Into Enterprise Mobility Management (EMM) and Beyond
Read the original article: SMBs Are Ready to Grow Into Enterprise Mobility Management (EMM) and Beyond SMBs require enterprise-class solutions around mobility and endpoint management, but delivered in the way smaller firms acquire, deploy and manage IT management systems. The…
Take a Bite Out of Sweyn
Read the original article: Take a Bite Out of Sweyn If you work in the healthcare industry, you may have heard about a family of vulnerabilities called “SweynTooth.” But how serious is SweynTooth, and what should hospitals be doing to…
Why Security Orchestration, Automation and Response (SOAR) Is Fundamental to a Security Platform
Read the original article: Why Security Orchestration, Automation and Response (SOAR) Is Fundamental to a Security Platform Placing SOAR at the heart of a security platform helps teams extend and maximize value across the ecosystem and to any security process…
Refocusing Cybersecurity Best Practices on Security Hygiene
Read the original article: Refocusing Cybersecurity Best Practices on Security Hygiene Attackers often increase their efforts to breach networks and systems during troubling times. As organizations around the world focus on the COVID-19 pandemic, security hygiene should be a focus,…
Five Common Data Security Pitfalls: Do You Know How to Avoid Them?
Read the original article: Five Common Data Security Pitfalls: Do You Know How to Avoid Them? By avoiding these common data security failures, organizations can protect their valuable assets and steer clear of the next major data breach. The post…
How Chatbots Can Help Bridge Business Continuity and Cybersecurity
Read the original article: How Chatbots Can Help Bridge Business Continuity and Cybersecurity With the range of challenges facing organizations right now, chatbots may be one solution that can help ensure both business continuity and security continuity. The post How…
What the Data Is Telling Us About the Current Rise in Security Threats During the COVID-19 Pandemic
Read the original article: What the Data Is Telling Us About the Current Rise in Security Threats During the COVID-19 Pandemic IBM X-Force Research has been seeing a significant number of new malicious domains related to COVID-19 appear in the…
X-Force IRIS Overcomes Broken Decryption Mechanism in Jest Ransomware
Read the original article: X-Force IRIS Overcomes Broken Decryption Mechanism in Jest Ransomware IBM X-Force Incident Response and Intelligence Services (IRIS) recently helped a company fend off a ransomware attack by building a custom decryptor for a strain of ransomware…
When Implementing Zero Trust, Context Is Everything
Read the original article: When Implementing Zero Trust, Context Is Everything Why, with all these layers of protection, are we still experiencing expensive breaches? Here’s why sharing context between security silos is the bedrock of a successful Zero Trust implementation.…
How to Build Usability Into Your Security Program
Read the original article: How to Build Usability Into Your Security Program Having solid security measures in place is a necessary condition for achieving your organization’s overarching goals, but user productivity requires both security and usability. The post How to…
Manage All the Things: Unified Endpoint Management (UEM) and the Expanding IoT
Read the original article: Manage All the Things: Unified Endpoint Management (UEM) and the Expanding IoT Having management functions and visibility across wearables, ruggedized endpoints and other connected IoT equipment can give a business greater situational awareness when it comes…