Simplify Your Security With an Open Cloud-Based Platform

Today, we’re announcing IBM Security Connect, an open, cloud-based platform that is capable of analyzing federated security data across unconnected tools and environments.

The post Simplify Your Security With an Open Cloud-Based Platform appeared first on Security Intelligence.

Continue reading Simplify Your Security With an Open Cloud-Based Platform

Cybersecurity Future Trends: Why More Bots Means More Jobs

Although AI is poised to take a much larger role in cybersecurity future trends, this doesn’t necessarily mean fewer opportunities for human analysts. In fact, it could mean quite the opposite.

The post Cybersecurity Future Trends: Why More Bots Means More Jobs appeared first on Security Intelligence.

Continue reading Cybersecurity Future Trends: Why More Bots Means More Jobs

How to Avoid the Trap of Fragmented Security Analytics

To move toward deep, advanced security analytics, CISOs should replace their fragmented tools with a platform-based approach that can leverage a broad set of data.

The post How to Avoid the Trap of Fragmented Security Analytics appeared first on Security Intelligence.

Continue reading How to Avoid the Trap of Fragmented Security Analytics

IDC Releases 2018 Vendor Assessment for Ruggedized and IoT Device Deployments

As the most widely deployed IBM SaaS solution, MaaS360 brings a strong set of unified endpoint management (UEM) capabilities for ruggedized hardware and IoT device deployments.

The post IDC Releases 2018 Vendor Assessment for Ruggedized and IoT Device Deployments appeared first on Security Intelligence.

Continue reading IDC Releases 2018 Vendor Assessment for Ruggedized and IoT Device Deployments

Following the Clues With DcyFS: A File System for Forensics

Decoy File System’s overlay layer is a forensic tool that helps security teams piece together what happens during a cyberattack and collect key evidence in the aftermath of a breach.

The post Following the Clues With DcyFS: A File System for Forensics appeared first on Security Intelligence.

Continue reading Following the Clues With DcyFS: A File System for Forensics

How Can Companies Defend Against Adversarial Machine Learning Attacks in the Age of AI?

Machine learning can strengthen your security posture, but it’s not without its blind spots. What do adversarial machine learning attacks look like, and how can companies stop them?

The post How Can Companies Defend Against Adversarial Machine Learning Attacks in the Age of AI? appeared first on Security Intelligence.

Continue reading How Can Companies Defend Against Adversarial Machine Learning Attacks in the Age of AI?

The State of Automotive Industrial IoT: Are Auto Companies Secure?

Industrial IoT technologies promise to revolutionize the automotive industry, but they also introduce new risks. What are the biggest threats auto companies face, and how can they mitigate them?

The post The State of Automotive Industrial IoT: Are Auto Companies Secure? appeared first on Security Intelligence.

Continue reading The State of Automotive Industrial IoT: Are Auto Companies Secure?

Reconciling Trust With Security: A Closer Look at Cyber Deception With DcyFS

Central to DcyFS’s cyber deception capabilities is its ability to modulate subject trust through a hierarchical file system organization.

The post Reconciling Trust With Security: A Closer Look at Cyber Deception With DcyFS appeared first on Security Intelligence.

Continue reading Reconciling Trust With Security: A Closer Look at Cyber Deception With DcyFS

The Road to Freedom: How a Strong Security Culture Can Enable Digital Transformation

Cybersecurity, if regarded as a strategic business enabler rather than an obstacle, can become the path to a smoother, freer digital transformation. Rethinking your security culture is the first step.

The post The Road to Freedom: How a Strong Security Culture Can Enable Digital Transformation appeared first on Security Intelligence.

Continue reading The Road to Freedom: How a Strong Security Culture Can Enable Digital Transformation

It’s Time to Adopt AI in Your Security Operations Center

If your security operations center (SOC) team is overwhelmed when it comes to cybersecurity, it’s time to consider AI to automate your time-consuming tasks.

The post It’s Time to Adopt AI in Your Security Operations Center appeared first on Security Intelligence.

Continue reading It’s Time to Adopt AI in Your Security Operations Center