Accelerate Your Journey to AWS with IBM Security

Security continues to be one of the top concerns for 90 percent of our clients adopting cloud. It’s further intensified with 75 percent of the clients embracing a multicloud deployment model. Cloud introduces a decentralized model that makes managing policies and keeping up with changing regulatory mandates challenging. In addition, cloud introduces additional risks, misconfigurations […]

The post Accelerate Your Journey to AWS with IBM Security appeared first on Security Intelligence.

Continue reading Accelerate Your Journey to AWS with IBM Security

What the Data Is Telling Us About the Current Rise in Security Threats During the COVID-19 Pandemic

IBM X-Force Research has been seeing a significant number of new malicious domains related to COVID-19 appear in the wild since late February 2020, based on Quad 9 data.

The post What the Data Is Telling Us About the Current Rise in Security Threats During the COVID-19 Pandemic appeared first on Security Intelligence.

Continue reading What the Data Is Telling Us About the Current Rise in Security Threats During the COVID-19 Pandemic

Innovation or Security? With Multifactor Authentication for the Mainframe, You Can Have Both

Now that we have tools that provide multifactor authentication (MFA) without friction, it’s time to upgrade your mainframe security to participate more fully in the benefits of digital transformation.

The post Innovation or Security? With Multifactor Authentication for the Mainframe, You Can Have Both appeared first on Security Intelligence.

Continue reading Innovation or Security? With Multifactor Authentication for the Mainframe, You Can Have Both

Busting Cybersecurity Silos

To break down cybersecurity silos, professionals must work together to share security information and build collaborative solutions to address the evolving cybersecurity threat landscape.

The post Busting Cybersecurity Silos appeared first on Security Intelligence.

Continue reading Busting Cybersecurity Silos

How to Use DNS Analytics to Find the Compromised Domain in a Billion DNS Queries

Using unique methods of analyzing DNS data, advanced DNS analytics enables security teams to quickly and proactively find and eliminate potential threats.

The post How to Use DNS Analytics to Find the Compromised Domain in a Billion DNS Queries appeared first on Security Intelligence.

Continue reading How to Use DNS Analytics to Find the Compromised Domain in a Billion DNS Queries

Supporting the Shift to Passwordless Authentication With FIDO

IBM is embracing FIDO authentication across its offerings as part of its effort to shift the industry toward a standardized approach to authentication and the eventual end of passwords.

The post Supporting the Shift to Passwordless Authentication With FIDO appeared first on Security Intelligence.

Continue reading Supporting the Shift to Passwordless Authentication With FIDO

TRusted Anonymous Data Exchange (TRADE) Threat Intelligence Sharing With Blockchain

A new threat intelligence sharing network allows companies to control both who has access to information and the quality of anonymous threat data they consume.

The post TRusted Anonymous Data Exchange (TRADE) Threat Intelligence Sharing With Blockchain appeared first on Security Intelligence.

Continue reading TRusted Anonymous Data Exchange (TRADE) Threat Intelligence Sharing With Blockchain

How Analytics Can Help You Better Understand Access Risks

The increasing complexity of modern IAM makes it hard to understand your organization’s access risks. Identity analytics can help by enhancing existing processes with a rich behavioral and event data.

The post How Analytics Can Help You Better Understand Access Risks appeared first on Security Intelligence.

Continue reading How Analytics Can Help You Better Understand Access Risks

Adversarial AI: As New Attack Vector Opens, Researchers Aim to Defend Against It

While fraudsters have yet to master adversarial AI, the only way for the security community to get ahead of the emerging threat is through collaborative defense.

The post Adversarial AI: As New Attack Vector Opens, Researchers Aim to Defend Against It appeared first on Security Intelligence.

Continue reading Adversarial AI: As New Attack Vector Opens, Researchers Aim to Defend Against It