Cloud Native Tools Series Part 1: Go Beyond Traditional Security

Like anyone who works with their hands, cybersecurity experts need the right tools for the job. As we’ll see in this blog and the series to follow, cloud-based threats need cloud native tools to combat them. Traditional security tools don’t provide the same level of functionality in the cloud as they do on premises. According […]

The post Cloud Native Tools Series Part 1: Go Beyond Traditional Security appeared first on Security Intelligence.

Continue reading Cloud Native Tools Series Part 1: Go Beyond Traditional Security

Training Trainers: How IBM Uses Data Breach Simulations to Build Real-World Competency

Threat intelligence and response teams need to be ready to respond to an increasing barrage of risks and changes. To be exact, this is where breach-and-attack-simulation (BAS) comes in. Most groups use BAS platforms to validate security controls against various types of data breaches. Meanwhile, IBM Security saw that it could also be very useful as […]

The post Training Trainers: How IBM Uses Data Breach Simulations to Build Real-World Competency appeared first on Security Intelligence.

Continue reading Training Trainers: How IBM Uses Data Breach Simulations to Build Real-World Competency

Crisis and an Incontestable Need for Security — A Business Viewpoint

Data, data, data.  We have plenty of it, and in the eyes of some, it’s considered too much of a good thing. In practical terms, too much data often translates into blurred sight lines or the likely abetting of threats hiding within our environment. Improperly managed, it surely affects one’s ability to simply ‘see’ what’s […]

The post Crisis and an Incontestable Need for Security — A Business Viewpoint appeared first on Security Intelligence.

Continue reading Crisis and an Incontestable Need for Security — A Business Viewpoint

Build a Roadmap for Cyber Resilience

The current information security landscape is rapidly evolving. According to the latest research from IBM Security and the Ponemon Institute’s 2020 Cyber Resilient Organization Report, 67% of organizations reported that the volume of attacks had significantly increased over the past 12 months. It’s not just the amount of attacks that grew; 64% of organizations also […]

The post Build a Roadmap for Cyber Resilience appeared first on Security Intelligence.

Continue reading Build a Roadmap for Cyber Resilience

DDoS Attacks Increase in Size, Frequency and Duration

Distributed denial of service (DDoS) attacks are increasing in size, frequency and duration. Kaspersky Lab reported a doubling of DDoS attacks in the first quarter of 2020 compared with the fourth quarter of 2019, plus an 80% jump compared with the same quarter last year. Kaspersky also found that DDoS cyberattacks are increasing in duration. […]

The post DDoS Attacks Increase in Size, Frequency and Duration appeared first on Security Intelligence.

Continue reading DDoS Attacks Increase in Size, Frequency and Duration

Deciphering Between Incident Management and Crisis Management

Cyber threats come in many forms and can severely impact business operations, brand reputation, financial standing and even lead to a lawsuit. Organizations must prepare to respond and manage cyber events at different organizational levels to limit their damage and accelerate recovery. Most businesses focus on incident management or crisis management to react to cyber […]

The post Deciphering Between Incident Management and Crisis Management appeared first on Security Intelligence.

Continue reading Deciphering Between Incident Management and Crisis Management