Intelligence & Analytics April 17, 2015 The Definition of Security Intelligence 4 min read - IBM Security Intelligence Product expert Mark Ehr offers strategy guidance to help IT security teams effectively detect and respond to threats.
April 17, 2015 SearchBlox Vulnerabilities Underscore the Importance of Updating Enterprise Search Tools 2 min read - A set of four SearchBlox vulnerabilities could allow cybercriminals to conduct cross-site scripting attacks and cause other potential problems.
Identity & Access April 17, 2015 Securing Your Environment: Practical Approaches to IT Security 2 min read - When considering IT security, organizations may find themselves overwhelmed. Following these best practices can help them keep their enterprise secure.
April 17, 2015 Verizon Report Suggests Data Breach Costs and Mobile Threat Perceptions Inaccurate 2 min read - Security experts may be overestimating the cost of a data breach and the extent of mobile device threats, according to a report from Verizon.
Network April 17, 2015 Is Your Security Management Tool Secure? 2 min read - Security management tools are key to a company's security, but organizations must decide who has permission to use them and for what reason.
April 16, 2015 Bee in Your Botnet: AAEH Disrupted by Law Enforcement Sting 2 min read - A joint international task force has disrupted the Beebone botnet (AAEH), but are users really safe from this type of polymorphic malware?
Government April 16, 2015 Federal Cybersecurity Legislation Is on the Way — But Don’t Relax 3 min read - As cybersecurity incidents increase in frequency and severity, new legislation is being proposed to share information among organizations.
X-Force April 16, 2015 The Path Forward With Threat Intelligence and Sharing 3 min read - Threat intelligence sharing is becoming imperative for improving organizations' security, but it needs the right collaborative approach to be successful.
Endpoint April 15, 2015 Hiding Behind Android Runtime 4 min read - I recently gave a presentation at Black Hat Asia in Singapore. My talk discussed possible ways to create user-mode rootkits in the new Android Runtime.
April 15, 2015 Annual Threat Report: POS, HTTPS and SCADA Attacks on the Rise 2 min read - An annual threat report on the biggest IT security issues says CISOs should be concerned about cybercriminals hitting POS, SCADA and HTTPS systems.