Incident Response May 25, 2017 Incident Response: Planning for the Attack Before It Happens 2 min read - An effective backup strategy is simply one part of a larger security and incident response plan, which should be developed proactively.
Intelligence & Analytics May 24, 2017 Stopping Threats in Their Tracks With Proactive Monitoring 4 min read - An effective response to an advanced threat such as WannaCry can be broken down into two phases: vulnerability management and proactive monitoring.
Threat Intelligence May 17, 2017 Not-So-Terrible Twos: IBM X-Force Exchange Celebrates Its Second Birthday 3 min read - Since its inception two years ago, the IBM X-Force Exchange has grown into a comprehensive hub for industrywide threat intelligence collaboration.
May 16, 2017 Protect Against the WannaCry Ransomware Attack With IBM X-Force Threat Intelligence With QRadar 4 min read - Organizations affected by the WannaCry ransomware attack can leverage IBM X-Force Threat Intelligence with QRadar to mitigate this unprecedented threat.
Intelligence & Analytics May 5, 2017 Threat Intelligence in the Age of Cyber Warfare 3 min read - In the age of cyber warfare, security analysts must determine which assets are most critical and prioritize their defense strategies accordingly.
Malware May 4, 2017 Neverquest Gang Takes Leave — Is It the End of the Quest? 5 min read - IBM X-Force researchers recently observed a massive drop in Neverquest malware campaigns. Is it the end of an era for this Trojan?
Intelligence & Analytics May 3, 2017 Know Your Apps: Explore the IBM Security App Exchange Ecosystem for Collaborative Defense 3 min read - Security collaboration hits the next level with the IBM Security App Exchange, a marketplace for the security community to create and share apps.
Intelligence & Analytics April 19, 2017 Surfing the Tsunami of Threat Data With Cognitive Security 2 min read - Nowadays, most organizations' networks are under constant attack. Cognitive security is the key to locating IoCs within the tsunami of threat intelligence.
Data Protection April 14, 2017 Swimming in Security Data Without Drowning 4 min read - With so much security data and threat intelligence available, IT professionals are struggling to stay afloat in this expansive ocean of information.
Threat Intelligence April 10, 2017 Use Email to Manage Threat Intelligence Collections 2 min read - The IBM X-Force Exchange includes an email inbox feature that cuts down on information overload and enables analysts to easily share threat intelligence.