Hackers Calling Fair Game on Healthcare Institutions

The year 2019 saw big consumer brands get hacked: from Facebook to Capital One, every day people were urged to double-check their bank accounts and credit card statements to ensure their information had not been stolen. The prime target: all of your p… Continue reading Hackers Calling Fair Game on Healthcare Institutions

Why Cybercriminals Are Targeting Travel and Transportation

Why are travel companies increasingly targeted in cyberattacks? Valuable data and customer hospitality demands make the travel and transportation industry especially tempting to cybercriminals.

The post Why Cybercriminals Are Targeting Travel and Transportation appeared first on Security Intelligence.

Continue reading Why Cybercriminals Are Targeting Travel and Transportation

How Cyber-Secure Are Business Travelers? New Report Says Not Very

I know that open Wi-Fi is sometimes better than no Wi-Fi, which is why I always use a VPN when connecting to public networks. But not all business travelers are so careful, according to a new report.

The post How Cyber-Secure Are Business Travelers? New Report Says Not Very appeared first on Security Intelligence.

Continue reading How Cyber-Secure Are Business Travelers? New Report Says Not Very

How IBM X-Force IRIS Prepared for the Ukraine Election

More than a month before the first round of the Ukraine election in March, we decided that we couldn’t afford to sit on our heels until an attack was launched.

The post How IBM X-Force IRIS Prepared for the Ukraine Election appeared first on Security Intelligence.

Continue reading How IBM X-Force IRIS Prepared for the Ukraine Election

IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape

IBM X-Force’s top security predictions for 2019 cover a range of potential attack schemes and consequences, from industry-specific prognostications to a rapid expansion of emerging criminal schemes.

The post IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape appeared first on Security Intelligence.

Continue reading IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape

3 Lessons That Are Informing the Next Generation of the Cyber Range

With the success and lessons learned from our X-Force Command Cyber Range, IBM is excited to launch its new mobile command center, the X-Force Command Cyber Tactical Operations Center (C-TOC).

The post 3 Lessons That Are Informing the Next Generation of the Cyber Range appeared first on Security Intelligence.

Continue reading 3 Lessons That Are Informing the Next Generation of the Cyber Range

As Seen on TV: Important Lessons for Winning the Fight Against Cybercrime

The Science Channel documentary, “Dark Web: Fighting Cybercrime,” shows why practice runs are essential to help security teams and business leaders keep their cool in the face of a cyberattack.

The post As Seen on TV: Important Lessons for Winning the Fight Against Cybercrime appeared first on Security Intelligence.

Continue reading As Seen on TV: Important Lessons for Winning the Fight Against Cybercrime

WHOIS Behind Cyberattacks? Under GDPR, We May Not Know

The goal of the European Union’s General Data Protection Regulation (GDPR) is, among other things, to standardize data protection laws applicable to EU data subjects. Aimed at enhancing privacy protection, the enforcement of the regulation becomes effective on May 25. GDPR’s implementation on an issue relevant to the cybersecurity industry may well have negative consequences […]

The post WHOIS Behind Cyberattacks? Under GDPR, We May Not Know appeared first on Security Intelligence.

Continue reading WHOIS Behind Cyberattacks? Under GDPR, We May Not Know

New Year, New Threats: Five Security Predictions That Will Take Hold in 2018

The IBM Security X-Force team offered some security predictions for new trends in the technology landscape and threats that are poised to emerge in 2018.

The post New Year, New Threats: Five Security Predictions That Will Take Hold in 2018 appeared first on Security Intelligence.

Continue reading New Year, New Threats: Five Security Predictions That Will Take Hold in 2018

When a Cyber Crisis Hits, Know Your OODA Loops

OODA loops can help System 1-thinking security professionals react swiftly to cyberattacks and embrace an intuitive approach to incident response.

The post When a Cyber Crisis Hits, Know Your OODA Loops appeared first on Security Intelligence.

Continue reading When a Cyber Crisis Hits, Know Your OODA Loops