The Hack React: Testing a SOC Director’s Cybersecurity Incident Response

When Lincoln Healthcare experiences a watering hole attack, security operations center (SOC) director Malcolm Gerhard is tasked with developing a swift cybersecurity incident response. Will he succeed?

The post The Hack React: Testing a SOC Director’s Cybersecurity Incident Response appeared first on Security Intelligence.

Continue reading The Hack React: Testing a SOC Director’s Cybersecurity Incident Response

The Inadvertent Insider Threat: A CISO Confronts a Breach From Within

Human error, credential misuse and disgruntled employees aren’t the most common threats security leaders have to face — but the complexities of these incidents make insider threats the stuff of CISO nightmares.

The post The Inadvertent Insider Threat: A CISO Confronts a Breach From Within appeared first on Security Intelligence.

Continue reading The Inadvertent Insider Threat: A CISO Confronts a Breach From Within

The Digital Disaster: A CIO Embraces Cyber Resilience

What happens when a malware infection results in permanent loss of data, operational downtime and significant reputational damage? Experience the cyber resilience failures of airline CIO Martin Kinsley.

The post The Digital Disaster: A CIO Embraces Cyber Resilience appeared first on Security Intelligence.

Continue reading The Digital Disaster: A CIO Embraces Cyber Resilience

The Compliance Crisis: A Compliance Officer Faces an Outdated Risk Management Framework

Follow along with risk and compliance officer Frank Roth as he endeavors to fill in the gaps of an outdated (and incomplete) risk management framework in his new role at a utility company.

The post The Compliance Crisis: A Compliance Officer Faces an Outdated Risk Management Framework appeared first on Security Intelligence.

Continue reading The Compliance Crisis: A Compliance Officer Faces an Outdated Risk Management Framework

The Cloud Commotion: An IT Director’s Road to Cloud Transformation

Follow the decision-making process of IT director Shira Sutton as she endeavors to avoid security risks and unnecessary business continuity headaches on the journey to cloud transformation.

The post The Cloud Commotion: An IT Director’s Road to Cloud Transformation appeared first on Security Intelligence.

Continue reading The Cloud Commotion: An IT Director’s Road to Cloud Transformation

The Modernization Misstep: A CEO Takes on Digital Transformation

Step into the shoes of an insurance company CEO chasing digital transformation. Read on as she tries to avoid missteps in this story about modernization, risks, fraud and user experience.

The post The Modernization Misstep: A CEO Takes on Digital Transformation appeared first on Security Intelligence.

Continue reading The Modernization Misstep: A CEO Takes on Digital Transformation

Elevating Education on the Security and Resiliency Campus at Think 2018

Think 2018 offers attendees unique opportunity to interact with IBM experts, view hands-on demonstrations of cutting-edge technologies and tackle today’s top security issues.

The post Elevating Education on the Security and Resiliency Campus at Think 2018 appeared first on Security Intelligence.

Continue reading Elevating Education on the Security and Resiliency Campus at Think 2018

Unexpectedly Useful Skills for Careers in Cybersecurity

Seemingly unrelated skills — such as untangling yarn, herding cats and cataloging toys — can benefit people looking to start careers in cybersecurity.

The post Unexpectedly Useful Skills for Careers in Cybersecurity appeared first on Security Intelligence.

Continue reading Unexpectedly Useful Skills for Careers in Cybersecurity

What Do Avocados and Threat Intelligence Have in Common?

Like a delicious guacamole, security teams need a perfect mix of IP addresses, MD5 checksum hashes and other threat intelligence to protect their networks.

The post What Do Avocados and Threat Intelligence Have in Common? appeared first on Security Intelligence.

Continue reading What Do Avocados and Threat Intelligence Have in Common?

Just a Passing Fad? Fidget Spinners and the Malware Sandbox

A traditional malware sandbox running OS-level analysis is prone to missing sophisticated threats and advanced evasion techniques.

The post Just a Passing Fad? Fidget Spinners and the Malware Sandbox appeared first on Security Intelligence.

Continue reading Just a Passing Fad? Fidget Spinners and the Malware Sandbox