3 Lessons That Are Informing the Next Generation of the Cyber Range

With the success and lessons learned from our X-Force Command Cyber Range, IBM is excited to launch its new mobile command center, the X-Force Command Cyber Tactical Operations Center (C-TOC).

The post 3 Lessons That Are Informing the Next Generation of the Cyber Range appeared first on Security Intelligence.

Continue reading 3 Lessons That Are Informing the Next Generation of the Cyber Range

How to Land an Entry-Level Cybersecurity Job

Cybersecurity is still a fresh, growing and evolving industry. Finding the right entry-level cybersecurity job now can help you shape your career in this burgeoning field for years to come.

The post How to Land an Entry-Level Cybersecurity Job appeared first on Security Intelligence.

Continue reading How to Land an Entry-Level Cybersecurity Job

Cybersecurity Skills Aren’t Just for Security Professionals Anymore

Real security improvement comes when everyone in the workplace, not just IT and security professionals, is serious about practicing cybersecurity skills and habits.

The post Cybersecurity Skills Aren’t Just for Security Professionals Anymore appeared first on Security Intelligence.

Continue reading Cybersecurity Skills Aren’t Just for Security Professionals Anymore

National Cyber Security Awareness Month: What’s New for 2018?

To kick off October, we take a look back at what happened in cybersecurity in 2018 and a sneak peek at this year’s National Cyber Security Awareness Month.

The post National Cyber Security Awareness Month: What’s New for 2018? appeared first on Security Intelligence.

Continue reading National Cyber Security Awareness Month: What’s New for 2018?

Why We Need Women in Security and What We’re Doing to Help

Through programs such as Cyber Day 4 Girls and Cyber Day for Collegiate Women, IBM is encouraging young female students to join the cyber workforce and boost the percentage of women in security.

The post Why We Need Women in Security and What We’re Doing to Help appeared first on Security Intelligence.

Continue reading Why We Need Women in Security and What We’re Doing to Help

How Brad Olive Fights Fires With Security Awareness

Brad Olive has been spreading security awareness since the dawn of the internet. Today he develops personalized learning road maps aimed at various roles and user types for IBM Security Academy.

The post How Brad Olive Fights Fires With Security Awareness appeared first on Security Intelligence.

Continue reading How Brad Olive Fights Fires With Security Awareness

Cybersecurity Muscle Memory: Drilling for a Tight Incident Response

It’s not enough to follow a rough outline of your incident response strategy. Conduct regular, intensive, detailed exercises within a well-defined framework to establish cybersecurity muscle memory.

The post Cybersecurity Muscle Memory: Drilling for a Tight Incident Response appeared first on Security Intelligence.

Continue reading Cybersecurity Muscle Memory: Drilling for a Tight Incident Response

How Gaming Prepares Youth for Careers in Cybersecurity

The time kids spend playing video games online may provide opportunities for learning cybersecurity basics. Experts believe the post-millennial generation could be primed for careers in cybersecurity.

The post How Gaming Prepares Youth for Careers in Cybersecurity appeared first on Security Intelligence.

Continue reading How Gaming Prepares Youth for Careers in Cybersecurity

Security Gamification Engineer Richard Moore Proves That Anyone Can Be a Hacker

Security gamification engineer Richard Moore designs cyberthreat scenarios to unlock the competitive spirit of cybersecurity professionals and demonstrate how easy it is for anyone to hack a system.

The post Security Gamification Engineer Richard Moore Proves That Anyone Can Be a Hacker appeared first on Security Intelligence.

Continue reading Security Gamification Engineer Richard Moore Proves That Anyone Can Be a Hacker

How to Protect Your Organization From Insider Threats

Malicious actors outside your organization aren’t always the only ones at fault for data breaches. Comprehensive employee security training is crucial to minimize the risk of insider threats.

The post How to Protect Your Organization From Insider Threats appeared first on Security Intelligence.

Continue reading How to Protect Your Organization From Insider Threats