Phish or Fox? A Penetration Testing Case Study From IBM X-Force Red

The IBM X-Force Red team recently ran into trouble on a black-box penetration testing assignment. Here’s how the testers overcame the obstacles to ultimately establish a solid adversarial operation.

The post Phish or Fox? A Penetration Testing Case Study From IBM X-Force Red appeared first on Security Intelligence.

Continue reading Phish or Fox? A Penetration Testing Case Study From IBM X-Force Red

Security Analysts Are Overworked, Understaffed and Overwhelmed — Here’s How AI Can Help

Today’s security teams lack the time, talent and resources to keep up with the rapidly evolving threat landscape. AI can automate tedious processes and take some pressure off security analysts.

The post Security Analysts Are Overworked, Understaffed and Overwhelmed — Here’s How AI Can Help appeared first on Security Intelligence.

Continue reading Security Analysts Are Overworked, Understaffed and Overwhelmed — Here’s How AI Can Help

It’s Time to Infuse AI Into Your Endpoint Security Strategy

As the threat landscape evolves to target connected devices, artificial intelligence (AI) and machine learning will become increasingly crucial parts of any organization’s endpoint security strategy.

The post It’s Time to Infuse AI Into Your Endpoint Security Strategy appeared first on Security Intelligence.

Continue reading It’s Time to Infuse AI Into Your Endpoint Security Strategy

Can a Cognitive-Powered Security Intelligence Platform Bring Your SOC Up to Speed?

Without cognitive insights, a security intelligence platform does little to ease the pressure on short-staffed security operations center (SOC) teams to analyze massive volumes of threat data.

The post Can a Cognitive-Powered Security Intelligence Platform Bring Your SOC Up to Speed? appeared first on Security Intelligence.

Continue reading Can a Cognitive-Powered Security Intelligence Platform Bring Your SOC Up to Speed?

Breaking Bad Behavior: Can AI Combat Insider Threats?

Artificial intelligence (AI) tools enable security teams to identify behavioral patterns that could point to insider threats more quickly.

The post Breaking Bad Behavior: Can AI Combat Insider Threats? appeared first on Security Intelligence.

Continue reading Breaking Bad Behavior: Can AI Combat Insider Threats?

RSAC 2018 in Review: Highlights, Key Sessions and Emerging Industry Trends

At RSAC 2018, countless security experts and practitioners gathered in San Francisco to talk about emerging threats and how the cybersecurity industry can prepare to meet evolving challenges.

The post RSAC 2018 in Review: Highlights, Key Sessions and Emerging Industry Trends appeared first on Security Intelligence.

Continue reading RSAC 2018 in Review: Highlights, Key Sessions and Emerging Industry Trends

Anti-I: The Future of AI-Generated Malware

As AI progresses, security professionals must prepare for the inevitability of machines writing their own malware to infect other machines in the not-so-distant future.

The post Anti-I: The Future of AI-Generated Malware appeared first on Security Intelligence.

Continue reading Anti-I: The Future of AI-Generated Malware

Adversarial AI: As New Attack Vector Opens, Researchers Aim to Defend Against It

While fraudsters have yet to master adversarial AI, the only way for the security community to get ahead of the emerging threat is through collaborative defense.

The post Adversarial AI: As New Attack Vector Opens, Researchers Aim to Defend Against It appeared first on Security Intelligence.

Continue reading Adversarial AI: As New Attack Vector Opens, Researchers Aim to Defend Against It

Cybersecurity’s Next Major Challenge: Connecting Human and Machine Intelligence

Today, IBM introduced the Resilient Incident Response Platform (IRP) with Intelligent Orchestration and X-Force Threat Management services to help organizations connect human and machine intelligence.

The post Cybersecurity’s Next Major Challenge: Connecting Human and Machine Intelligence appeared first on Security Intelligence.

Continue reading Cybersecurity’s Next Major Challenge: Connecting Human and Machine Intelligence

Breaking Down the Security Immune System: Proactive Database Protection Through SIEM Integration

Security analysts can maximize the effectiveness of their incident response capabilities by integrating disparate tools such as database firewalls and UBA with a strong SIEM solution.

The post Breaking Down the Security Immune System: Proactive Database Protection Through SIEM Integration appeared first on Security Intelligence.

Continue reading Breaking Down the Security Immune System: Proactive Database Protection Through SIEM Integration