And Don’t Be Falling in Love as Security Services Experts Are Walking Away

Security professionals and enthusiasts will have many opportunities to connect with security services experts at IBM InterConnect 2017.

The post And Don’t Be Falling in Love as Security Services Experts Are Walking Away appeared first on Security Intelligence.

Continue reading And Don’t Be Falling in Love as Security Services Experts Are Walking Away

Information Overload — Now What?

Too many security solutions can generate information overload, but a unified managed security services solution can help IT teams reduce the noise.

The post Information Overload — Now What? appeared first on Security Intelligence.

Continue reading Information Overload — Now What?

IBM Named a Leader in 2016 Gartner Magic Quadrant for Managed Security Services (MSSP)

IBM was named a Leader in the 2016 Gartner Magic Quadrant for Managed Security Services due in large part to positive testimonials from IBM clients.

The post IBM Named a Leader in 2016 Gartner Magic Quadrant for Managed Security Services (MSSP) appeared first on Security Intelligence.

Continue reading IBM Named a Leader in 2016 Gartner Magic Quadrant for Managed Security Services (MSSP)

Rising Attack Rates and Massive Breaches Plague Government Organizations

IBM’s “2016 Cyber Security Intelligence Index” reported that the government sector is now the fourth most frequently targeted industry in the U.S.

The post Rising Attack Rates and Massive Breaches Plague Government Organizations appeared first on Security Intelligence.

Continue reading Rising Attack Rates and Massive Breaches Plague Government Organizations

Best Practices for Selecting a Managed Security Services Provider for Organizations in Asia-Pacific

As IT managers in Asia-Pacific continue to struggle with a skills gap, it’s more critical than ever to choose the right managed security services provider.

The post Best Practices for Selecting a Managed Security Services Provider for Organizations in Asia-Pacific appeared first on Security Intelligence.

Continue reading Best Practices for Selecting a Managed Security Services Provider for Organizations in Asia-Pacific

Mirai Evolving: New Attack Reveals Use of Port 7547

Cybercriminals recently discovered how to modify the Mirai botnet source code, which leaked in September, to compromise devices remotely via TCP port 7547.

The post Mirai Evolving: New Attack Reveals Use of Port 7547 appeared first on Security Intelligence.

Continue reading Mirai Evolving: New Attack Reveals Use of Port 7547

MSS Offerings: Looking Under the Hood

IT managers should consider a provider’s quality of SOC staffing, flexibility and ability to meet business objectives when comparing MSS offerings.

The post MSS Offerings: Looking Under the Hood appeared first on Security Intelligence.

Continue reading MSS Offerings: Looking Under the Hood

Hello, You’ve Been Compromised: Upward Attack Trend Targeting VoIP Protocol SIP

According to IBM Managed Security Services data, cybercriminals most commonly target the SIP and SCCP protocols in VOIP spam attacks.

The post Hello, You’ve Been Compromised: Upward Attack Trend Targeting VoIP Protocol SIP appeared first on Security Intelligence.

Continue reading Hello, You’ve Been Compromised: Upward Attack Trend Targeting VoIP Protocol SIP

Ninety-Five Percent of Webshell Attacks Written in PHP

Webshells are dangerous in the hands of APT groups. According to IBM Managed Security Services (MSS), 95 percent of webshell attacks are written in PHP.

The post Ninety-Five Percent of Webshell Attacks Written in PHP appeared first on Security Intelligence.

Continue reading Ninety-Five Percent of Webshell Attacks Written in PHP

Consequences of IoT and Telnet: Foresight Is Better Than Hindsight

Cybercriminals have learned how to exploit the IoT and Telnet servers to commit record-shattering DDoS attacks against major websites.

The post Consequences of IoT and Telnet: Foresight Is Better Than Hindsight appeared first on Security Intelligence.

Continue reading Consequences of IoT and Telnet: Foresight Is Better Than Hindsight