Leveraging Open Source Can be Powerful for Cybersecurity

Security vendors and end users have access to the same technology and resources, if not more, than the threat actor community. However, the area where cybersecurity falls short as an industry is teamwork. Vendors and end users rarely talk to each other as a broader force. Thus, while innovation may happen for individual products, that […]

The post Leveraging Open Source Can be Powerful for Cybersecurity appeared first on Security Intelligence.

Continue reading Leveraging Open Source Can be Powerful for Cybersecurity

Introducing Collaborative Automated Course of Action Operations (CACAO): An Emerging Cybersecurity Standard to Quickly Define and Share Playbooks

A common challenge security teams face is ensuring their organization can continue to operate despite cyber attacks — in other words, to demonstrate their cyber resilience. Research from the Ponemon Institute acknowledges that the volume and severity of cyber attacks continues to rise, but suggests that organizations can improve their cyber resilience by a combination of process and […]

The post Introducing Collaborative Automated Course of Action Operations (CACAO): An Emerging Cybersecurity Standard to Quickly Define and Share Playbooks appeared first on Security Intelligence.

Continue reading Introducing Collaborative Automated Course of Action Operations (CACAO): An Emerging Cybersecurity Standard to Quickly Define and Share Playbooks

Defragging Security With a Platform Approach

With cyberattacks at an all-time high, security leaders must strike a balance between comprehensive security and runaway complexity. This webinar discusses what a security platform can do to help.

The post Defragging Security With a Platform Approach appeared first on Security Intelligence.

Continue reading Defragging Security With a Platform Approach

Meanwhile at the Plant…The Realities of Operational Security in the Age of Connected Machines

As OT environments, especially with legacy systems in place, become increasingly connected, they may inherit OT security risks that were previously the domain of the IT environment.

The post Meanwhile at the Plant…The Realities of Operational Security in the Age of Connected Machines appeared first on Security Intelligence.

Continue reading Meanwhile at the Plant…The Realities of Operational Security in the Age of Connected Machines

How to Get the Most Out of DEF CON and Black Hat 2018

The IBM X-Force Red team is well-represented at DEF CON and Black Hat 2018, hosting sessions and panels about smart city security, vulnerability management and more.

The post How to Get the Most Out of DEF CON and Black Hat 2018 appeared first on Security Intelligence.

Continue reading How to Get the Most Out of DEF CON and Black Hat 2018

Can You Guess the Cost of a Data Breach in the Asia-Pacific?

The rapid expansion of the Asia-Pacific economy is presenting new cybersecurity challenges and driving up the cost of a data breach in the region.

The post Can You Guess the Cost of a Data Breach in the Asia-Pacific? appeared first on Security Intelligence.

Continue reading Can You Guess the Cost of a Data Breach in the Asia-Pacific?

Life’s a Breach: Dissecting a Year of Devastating Data Breaches

The volume and sophistication of data breaches grew dramatically in 2016 as cybercriminals began targeting unstructured data for the first time.

The post Life’s a Breach: Dissecting a Year of Devastating Data Breaches appeared first on Security Intelligence.

Continue reading Life’s a Breach: Dissecting a Year of Devastating Data Breaches

Leapfrog the Skills Shortage and Security Intelligence Challenge With Cognitive Security

Cognitive security solutions dig through structured and unstructured data to deliver deep insights and patterns and empower CISOs to make better decisions.

The post Leapfrog the Skills Shortage and Security Intelligence Challenge With Cognitive Security appeared first on Security Intelligence.

Continue reading Leapfrog the Skills Shortage and Security Intelligence Challenge With Cognitive Security

Best Practices for Selecting a Managed Security Services Provider for Organizations in Asia-Pacific

As IT managers in Asia-Pacific continue to struggle with a skills gap, it’s more critical than ever to choose the right managed security services provider.

The post Best Practices for Selecting a Managed Security Services Provider for Organizations in Asia-Pacific appeared first on Security Intelligence.

Continue reading Best Practices for Selecting a Managed Security Services Provider for Organizations in Asia-Pacific

Risk Management: Time for Introspection for Asia-Pacific Security Leaders

As per capita income rises in Asia-Pacific, so does the volume of cyberattacks. Security leaders must answer tough questions about risk management.

The post Risk Management: Time for Introspection for Asia-Pacific Security Leaders appeared first on Security Intelligence.

Continue reading Risk Management: Time for Introspection for Asia-Pacific Security Leaders