X-Force December 14, 2017 New Year, New Threats: Five Security Predictions That Will Take Hold in 2018 3 min read - The IBM Security X-Force team offered some security predictions for new trends in the technology landscape and threats that are poised to emerge in 2018.
Risk Management December 13, 2017 The Benefits of Operational Risk Management 2 min read - Operational risk management can help organizations measure the cost of network security solutions versus the cost of a potential data breach.
Threat Hunting December 12, 2017 Threat Hunters Hansel and Gretel Keep the Forest Safe 2 min read - Thanks to their harrowing experience with the Evil Witch, Hansel and Gretel went on to become expert threat hunters to protect the children of the forest.
Risk Management December 11, 2017 Understanding the COSO 2017 Enterprise Risk Management Framework, Part 1: An Introduction 4 min read - The new COSO enterprise risk management framework offers business leaders a road map to more effectively assess, manage, review and report on cyber risks.
Fraud Protection December 8, 2017 Cybersecurity, Fraud and Operational Risk: The Time for Cognitive Convergence Is Now 5 min read - The threat landscape is expanding, and organizations must undergo a cognitive convergence to manage evolving security, fraud and operational risks.
CISO December 7, 2017 What Does Secure Digital Transformation Mean to You? 2 min read - A secure digital transformation requires open lines of communication and collaboration between line of business executives and security leaders.
Retail December 4, 2017 Loss Prevention Trends to Watch During the Holiday Shopping Season 3 min read - Physical theft accounted for two-thirds of inventory shrinkage in 2016, suggesting that retailers need to improve their loss prevention strategies.
Advanced Threats November 28, 2017 Traveling This Holiday Season? Beware of RFID Attacks 7 min read - Consumers traveling during the holiday season should be aware of RFID attacks that could enable thieves to control their hotel key cards and digital locks.
November 25, 2017 Managing Security Risk in the Face of Intel ME Vulnerabilities 5 min read - On November 22, Intel Corporation confirmed security vulnerabilities relating to Intel Management Engine (ME), Intel Server Platform Service (SPS),...
CISO November 20, 2017 Take a Load Off: Delegate Cyber Risk Management Using the Three Lines of Defense Model 4 min read - The Three Lines of Defense model enables board directors to be involved in the cyber risk management process without micromanaging the security team.