November 16, 2018 Outlaw Threat Group Using Perl Shellbot to Target Enterprise IoT Devices 2 min read - A group of threat actors known as Outlaw is using a Perl Shellbot to breach enterprise IoT devices.
Intelligence & Analytics November 14, 2018 Why User Behavior Analytics Is an Application, Not a Cybersecurity Platform 3 min read - User behavior analytics (UBA) is a good application, but it isn't a replacement for SIEM. UBA is more accurately described as a cybersecurity application that can be added on top of an SIEM tool.
November 14, 2018 Canadian University Shuts Down Network in Response to Cryptocurrency Mining Attack 2 min read - A Canadian university had to take critical IT systems offline after security professionals identified an attack designed to mine cryptocurrency using the school's computing resources.
November 12, 2018 New Ransomware Strain Evades Detection by All but One Antivirus Engine 2 min read - A new strain of Dharma ransomware is able to evade detection by nearly all of the antivirus solutions on the market.
Endpoint November 7, 2018 How to Reduce Hidden Endpoint Management Costs and Increase Efficiency 5 min read - To reduce hidden endpoint management costs, look for solutions that give you comprehensive visibility into your endpoint landscape and enable you to consolidate tools and increase efficiency.
Intelligence & Analytics October 18, 2018 Orchestrating Incident Response Beyond Triage and Enrichment 2 min read - Incident response orchestration can help security teams transform response across the entire incident life cycle, including automating remedial actions and mitigating future attacks.
Intelligence & Analytics October 16, 2018 Simplify Your Security With an Open Cloud-Based Platform 3 min read - Today, we're announcing IBM Security Connect, an open, cloud-based platform that is capable of analyzing federated security data across unconnected tools and environments.
Threat Intelligence October 12, 2018 An Increase in PowerShell Attacks: Observations From IBM X-Force IRIS 9 min read - Since the open source release of the PowerShell framework in 2016, IBM X-Force Incident Response and Intelligence Services (IRIS) has identified an upward trend in malicious PowerShell use.
Data Protection October 3, 2018 The Wild West of Data Risk Management in the Age of Cloud, Mobile and Digital Transformation 3 min read - In today's rapidly evolving security environment, it's imperative for organizations to establish a formal data risk management program that does more than just check the boxes.
Identity & Access September 26, 2018 Protect Your ‘Matrix’ With Strong Privileged Access Management 5 min read - "The Matrix" shows the damage that a rogue actor can cause by gaining privileged access to a digital environment. Privileged access management tools can help security teams keep their networks secure.