Turning Down the Noise: Adding Context to the SIEM With Modern Data Security

Let’s say I tell you that my daughter crawled today. However, you don’t know if my daughter is an infant or 30 years old. If you ask, and I tell you my daughter is an infant, you still don’t know if she’s already been crawling or today marks the first time. If this is the […]

The post Turning Down the Noise: Adding Context to the SIEM With Modern Data Security appeared first on Security Intelligence.

Continue reading Turning Down the Noise: Adding Context to the SIEM With Modern Data Security

2021 X-Force Threat Intelligence Index Reveals Peril From Linux Malware, Spoofed Brands and COVID-19 Targeting

From the front lines of incident response engagements to managed security services, IBM Security X-Force observes attack trends firsthand, yielding insights into the cyber threat landscape. Every year, X-Force collates billions of data points to assess cybersecurity threats to our customers.  This report — the X-Force Threat Intelligence Index 2021 — represents our latest edition of […]

The post 2021 X-Force Threat Intelligence Index Reveals Peril From Linux Malware, Spoofed Brands and COVID-19 Targeting appeared first on Security Intelligence.

Continue reading 2021 X-Force Threat Intelligence Index Reveals Peril From Linux Malware, Spoofed Brands and COVID-19 Targeting

The Evolution of the SIEM

SIEM technology has evolved drastically over the past decade and will continue to mature as the threat landscape shifts and customers’ needs change.

The post The Evolution of the SIEM appeared first on Security Intelligence.

Continue reading The Evolution of the SIEM

Blocking Bad: The Importance of Blocking and Virtual Patching

Blocking refers to the practice of deploying network security devices to block threats as they traverse the network.

The post Blocking Bad: The Importance of Blocking and Virtual Patching appeared first on Security Intelligence.

Continue reading Blocking Bad: The Importance of Blocking and Virtual Patching

Qradar Advisor With Watson Makes Cybersecurity More Human

QRadar Advisor with Watson is not meant to replace humans in the SOC. Instead, it is designed to help analysts make better decisions more quickly.

The post Qradar Advisor With Watson Makes Cybersecurity More Human appeared first on Security Intelligence.

Continue reading Qradar Advisor With Watson Makes Cybersecurity More Human

IoT: The Internet of Trouble

IBM is investing heavily in cognitive computing and other emerging technologies designed to help analysts secure the growing number of IoT devices.

The post IoT: The Internet of Trouble appeared first on Security Intelligence.

Continue reading IoT: The Internet of Trouble

Will Watson Save the Security World?

Can IBM QRadar Advisor with Watson save the world? We won’t know until it matures, but Watson has already shown great potential to assist SOC analysts.

The post Will Watson Save the Security World? appeared first on Security Intelligence.

Continue reading Will Watson Save the Security World?

Take the First Step Toward GDPR Compliance With the Right IBM QRadar App

With the right QRadar app, security professionals can get a head start on achieving GDPR compliance before the regulation takes effect in May 2018.

The post Take the First Step Toward GDPR Compliance With the Right IBM QRadar App appeared first on Security Intelligence.

Continue reading Take the First Step Toward GDPR Compliance With the Right IBM QRadar App

Becoming an Agile Cyber-Ninja: Implementing SIEM the Right Way in 2017

To get the most out of SIEM tools such as QRadar, security analysts should abandon the traditional Waterfall methodology and adopt the Agile approach.

The post Becoming an Agile Cyber-Ninja: Implementing SIEM the Right Way in 2017 appeared first on Security Intelligence.

Continue reading Becoming an Agile Cyber-Ninja: Implementing SIEM the Right Way in 2017

Becoming an Agile Cyber-Ninja: Implementing SIEM the Right Way in 2017

To get the most out of SIEM tools such as QRadar, security analysts should abandon the traditional Waterfall methodology and adopt the Agile approach.

The post Becoming an Agile Cyber-Ninja: Implementing SIEM the Right Way in 2017 appeared first on Security Intelligence.

Continue reading Becoming an Agile Cyber-Ninja: Implementing SIEM the Right Way in 2017