IBM Experts Weigh In on the Value of an Industry-Focused Approach to Security

The IBM Security immune system consists of integrated, industry-focused solutions to help clients across all sectors maximize their security investments.

The post IBM Experts Weigh In on the Value of an Industry-Focused Approach to Security appeared first on Security Intelligence.

Continue reading IBM Experts Weigh In on the Value of an Industry-Focused Approach to Security

Incident Response and Threat Intelligence: A Potent One-Two Punch to Fight Cybercrime

IBM X-Force IRIS combines incident response with threat intelligence to help organizations analyze cybercriminals’ behavior and predict future trends.

The post Incident Response and Threat Intelligence: A Potent One-Two Punch to Fight Cybercrime appeared first on Security Intelligence.

Continue reading Incident Response and Threat Intelligence: A Potent One-Two Punch to Fight Cybercrime

Hello, My Name Is Space Rogue

IBM X-Force Red marked its first anniversary with the addition of security specialists, including Space Rogue, bolstering the team’s talent roster.

The post Hello, My Name Is Space Rogue appeared first on Security Intelligence.

Continue reading Hello, My Name Is Space Rogue

Protect Your Twitter Account or Face Serious Security Consequences

It’s crucial to protect your Twitter account to avoid exposing yourself or your business to financial, reputational and legal consequences.

The post Protect Your Twitter Account or Face Serious Security Consequences appeared first on Security Intelligence.

Continue reading Protect Your Twitter Account or Face Serious Security Consequences

Use Email to Manage Threat Intelligence Collections

The IBM X-Force Exchange includes an email inbox feature that cuts down on information overload and enables analysts to easily share threat intelligence.

The post Use Email to Manage Threat Intelligence Collections appeared first on Security Intelligence.

Continue reading Use Email to Manage Threat Intelligence Collections

The Retail Industry and the Challenges of Enterprise Mobility Management

MaaS360 provides IT managers in the retail industry with all the enterprise mobility management tools they need to control remote access to corporate data.

The post The Retail Industry and the Challenges of Enterprise Mobility Management appeared first on Security Intelligence.

Continue reading The Retail Industry and the Challenges of Enterprise Mobility Management

Understanding Cyber Threat Hunting

When implementing threat hunting programs for the first time, IT teams should start with basic concepts, then add more capabilities gradually.

The post Understanding Cyber Threat Hunting appeared first on Security Intelligence.

Continue reading Understanding Cyber Threat Hunting

Man Versus Machine: IBM Brings Science Fiction to Life With Cognitive Security

With its innovative cloud, IoT and cognitive security offerings, IBM is bringing science fiction to life. Learn more about AI and Watson at InterConnect.

The post Man Versus Machine: IBM Brings Science Fiction to Life With Cognitive Security appeared first on Security Intelligence.

Continue reading Man Versus Machine: IBM Brings Science Fiction to Life With Cognitive Security

Identity and Access Governance: Lessons From the Front Line

Identity and access governance is not a technology project — it’s a business transformation program. Organizationwide buy in is critical.

The post Identity and Access Governance: Lessons From the Front Line appeared first on Security Intelligence.

Continue reading Identity and Access Governance: Lessons From the Front Line

Detect, Analyze, Respond: Attend These Key Talks at InfoSec World 2017

The InfoSec World 2017 main conference will feature more than 70 talks and collaborative sessions presented by familiar speakers and new voices.

The post Detect, Analyze, Respond: Attend These Key Talks at InfoSec World 2017 appeared first on Security Intelligence.

Continue reading Detect, Analyze, Respond: Attend These Key Talks at InfoSec World 2017