The First Rule of Security Club: Don’t Talk About Security

The first rule about Security Club is don’t talk about security — or, at least, don’t let security initiatives get in the way of delivering business value.

The post The First Rule of Security Club: Don’t Talk About Security appeared first on Security Intelligence.

Continue reading The First Rule of Security Club: Don’t Talk About Security

Connecting the Dots With the IBM Cognitive SOC and Watson for Cyber Security

With IBM’s Cognitive SOC and Watson for Cyber Security, analysts can detect and respond to incidents that traditional threat intelligence platforms miss.

The post Connecting the Dots With the IBM Cognitive SOC and Watson for Cyber Security appeared first on Security Intelligence.

Continue reading Connecting the Dots With the IBM Cognitive SOC and Watson for Cyber Security

Adaptive Security: The Safety Net in the Flying Trapeze Act

IT leaders should use adaptive security solutions as a safety net to protect user, customer and corporate data from fraudsters.

The post Adaptive Security: The Safety Net in the Flying Trapeze Act appeared first on Security Intelligence.

Continue reading Adaptive Security: The Safety Net in the Flying Trapeze Act

For the Love of SIEM

Not feeling the love from your SIEM solution? Integrate it with existing tools to best fit the unique needs and goals of your business.

The post For the Love of SIEM appeared first on Security Intelligence.

Continue reading For the Love of SIEM

Bringing the Power of Watson and Cognitive Computing to the Security Operations Center

The power of Watson and cognitive computing enables security operations center specialists to defend their environments against threats with confidence.

The post Bringing the Power of Watson and Cognitive Computing to the Security Operations Center appeared first on Security Intelligence.

Continue reading Bringing the Power of Watson and Cognitive Computing to the Security Operations Center

IBM QRadar Advisor with Watson: Revolutionizing the Way Security Analysts Work

IBM Security developed QRadar Advisor to help IT analysts address gaps in speed, accuracy and intelligence and respond to incidents more confidently

The post IBM QRadar Advisor with Watson: Revolutionizing the Way Security Analysts Work appeared first on Security Intelligence.

Continue reading IBM QRadar Advisor with Watson: Revolutionizing the Way Security Analysts Work

It’s Time to Go Beyond Next-Generation Endpoint Security

To protect the most vulnerable gateways into their networks, IT leaders must go beyond next-generation endpoint security with IBM BigFix Detect.

The post It’s Time to Go Beyond Next-Generation Endpoint Security appeared first on Security Intelligence.

Continue reading It’s Time to Go Beyond Next-Generation Endpoint Security

An Education Initiative in Cognitive Application: How I Embarked on Designing a Master’s Course for GSU

An education in cognitive application should demonstrate the power of Watson and show students what it takes to become a security analyst.

The post An Education Initiative in Cognitive Application: How I Embarked on Designing a Master’s Course for GSU appeared first on Security Intelligence.

Continue reading An Education Initiative in Cognitive Application: How I Embarked on Designing a Master’s Course for GSU

Perspectives on Securing Mobile and Social Business, 12 Months On

The IT landscape has changed since we issued our paper on securing mobile and social business in late 2015. We revised our findings to reflect this shift.

The post Perspectives on Securing Mobile and Social Business, 12 Months On appeared first on Security Intelligence.

Continue reading Perspectives on Securing Mobile and Social Business, 12 Months On

Perspectives on Securing Mobile and Social Business, 12 Months On

The IT landscape has changed since we issued our paper on securing mobile and social business in late 2015. We revised our findings to reflect this shift.

The post Perspectives on Securing Mobile and Social Business, 12 Months On appeared first on Security Intelligence.

Continue reading Perspectives on Securing Mobile and Social Business, 12 Months On