IBM X-Force Threat Intelligence Cybersecurity Brief: Novel Coronavirus (COVID-19)

Global events such as the Novel Coronavirus (COVID-19) make all of us attractive targets for cybersecurity criminals. Whether it’s phishing emails or new targeted scams, these tactics are meant to take advantage of citizens who are understandably concerned about their safety and health during this challenging time. COVID-19 email exploits can deliver damaging ransomware and […]

The post IBM X-Force Threat Intelligence Cybersecurity Brief: Novel Coronavirus (COVID-19) appeared first on Security Intelligence.

Continue reading IBM X-Force Threat Intelligence Cybersecurity Brief: Novel Coronavirus (COVID-19)

Why Cities Shouldn’t Pay Ransomware Criminals

Recent ransomware attacks on U.S. cities have revealed the exorbitant cost of recovering from a data breach. However, paying the ransom only empowers cybercriminals to continue their campaigns.

The post Why Cities Shouldn’t Pay Ransomware Criminals appeared first on Security Intelligence.

Continue reading Why Cities Shouldn’t Pay Ransomware Criminals

5 Things You Can Do After a Data Breach to Help Mitigate Cost

Reading Time: 5 minutes The cost of a data breach is rising, and a carefully planned and regularly rehearsed response can go a long way toward saving your company money in the wake of a security incident.

The post 5 Things You Can Do After a Data Breach to Help Mitigate Cost appeared first on Security Intelligence.

Continue reading 5 Things You Can Do After a Data Breach to Help Mitigate Cost

Why Cyber Range Training Should Be Top of Mind for Your Security Teams

When reputation, revenue and customer trust is at stake, immersive cyber range training can help security teams detect, respond and manage incidents effectively.

The post Why Cyber Range Training Should Be Top of Mind for Your Security Teams appeared first on Security Intelligence.

Continue reading Why Cyber Range Training Should Be Top of Mind for Your Security Teams

Incident Response: Planning for the Attack Before It Happens

An effective backup strategy is simply one part of a larger security and incident response plan, which should be developed proactively.

The post Incident Response: Planning for the Attack Before It Happens appeared first on Security Intelligence.

Continue reading Incident Response: Planning for the Attack Before It Happens

IBM X-Force IRIS: Bringing a New Approach to Incident Response

IBM formed the X-Force IRIS team to collaborate with clients to design solutions for today’s most challenging cybersecurity issues and threats.

The post IBM X-Force IRIS: Bringing a New Approach to Incident Response appeared first on Security Intelligence.

Continue reading IBM X-Force IRIS: Bringing a New Approach to Incident Response