Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

No one needs to tell you that data breaches are costly. That data has been quantified and the numbers are staggering. In fact, the IBM Security Cost of a Data Breach estimates that the average cost of a data breach in 2022 was $4.35 million, with 83% of organizations experiencing one or more security incidents. […]

The post Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It appeared first on Security Intelligence.

Continue reading Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

How to Embed Gen Z in Your Organization’s Security Culture

Generation Z, which Pew Research Center defines as those born after 1996, is considered the first digital-native generation. This group of young people always has the latest technology at their fingertips. Yet even with this strong digital connection, the National Cybersecurity Alliance (NCSA) found that Gen Zers have higher cyber incident victimization rates than previous […]

The post How to Embed Gen Z in Your Organization’s Security Culture appeared first on Security Intelligence.

Continue reading How to Embed Gen Z in Your Organization’s Security Culture

Everyone Wants to Build a Cyber Range: Should You? Part 2

The COVID-19 pandemic has shifted the way we work, and a large variety of teams have either gone virtual or hybrid, working remotely in some capacity, including IT and security teams. In a pandemic or other crisis, security teams that wish to stay sharp and continue to work on their incident response capabilities should consider […]

The post Everyone Wants to Build a Cyber Range: Should You? Part 2 appeared first on Security Intelligence.

Continue reading Everyone Wants to Build a Cyber Range: Should You? Part 2

Everyone Wants to Build a Cyber Range: Should You?

In the last few years, IBM X-Force has seen an unprecedented increase in requests to build cyber ranges. By cyber ranges, we mean facilities or online spaces that enable team training and exercises of cyberattack responses. Companies understand the need to drill their plans based on real-world conditions and using real tools, attacks and procedures. […]

The post Everyone Wants to Build a Cyber Range: Should You? appeared first on Security Intelligence.

Continue reading Everyone Wants to Build a Cyber Range: Should You?

The Next-Gen Cyber Range: Bringing Incident Response Exercises to the Cloud

At IBM X-Force, we keep our customers on the cutting edge of cybersecurity experiences, centered around incident response, and these include responding in cloud native environments. What is cloud native? It is a concept that grew out of the astonishing and rapid transition to cloud computing and is a fundamental shift in how applications and […]

The post The Next-Gen Cyber Range: Bringing Incident Response Exercises to the Cloud appeared first on Security Intelligence.

Continue reading The Next-Gen Cyber Range: Bringing Incident Response Exercises to the Cloud

Smell the Attack? Sensory-Immersive Cyber Range Training for Industry 4.0

Humanity has been through a number of industrial revolutions since the 1760s, and is now at its fourth cycle of sweeping industrial innovation, known as Industry 4.0. It is characterized by the ongoing automation of traditional manufacturing and industrial practices using modern smart technology. As such, it inherits risks and threats that apply to connected […]

The post Smell the Attack? Sensory-Immersive Cyber Range Training for Industry 4.0 appeared first on Security Intelligence.

Continue reading Smell the Attack? Sensory-Immersive Cyber Range Training for Industry 4.0

Why Red Team Testing Rules the Cloud

Red team testing is a key way to help prevent data breaches today. Most cyber defense focuses on spotting openings and fixing general risks in your environment. Red teaming not only reduces risks, but also prevents possible breaches. Methods, such as threat modeling, static analysis and dynamic testing, reduce the attack surface but do not […]

The post Why Red Team Testing Rules the Cloud appeared first on Security Intelligence.

Continue reading Why Red Team Testing Rules the Cloud

Chaos Engineering: Building the Next Generation of Cyber Ranges

In one of our past posts on the same subject, we discussed how to apply chaos engineering principles to cyber war-games and team simulation exercises in broad brush strokes. In short, ‘chaos engineering’ is the discipline of working and experimenting with new features and changes on a system that’s already in live production. The purpose […]

The post Chaos Engineering: Building the Next Generation of Cyber Ranges appeared first on Security Intelligence.

Continue reading Chaos Engineering: Building the Next Generation of Cyber Ranges

Why Cyber Ranges Are Effective To Train Your Teams

Cyber ranges may be one of the most effective ways to train IT professionals in defending against cyber attacks. The virtual environments deliver simulated real-world attacks that test multiple dimensions and stakeholders within diverse environments. Cybersecurity teams can use cyber ranges to practice defending against simulated threats in immersive training scenarios, essentially preparing and rehearsing […]

The post Why Cyber Ranges Are Effective To Train Your Teams appeared first on Security Intelligence.

Continue reading Why Cyber Ranges Are Effective To Train Your Teams

How Nat Prakongpan Found His Home on the Cyber Range

Nat Prakongpan was building enterprise networks for his school in Thailand in the seventh grade. Following a series of happy accidents, he found himself building an immersive cyber range for IBM.

The post How Nat Prakongpan Found His Home on the Cyber Range appeared first on Security Intelligence.

Continue reading How Nat Prakongpan Found His Home on the Cyber Range