DeepLocker: How AI Can Power a Stealthy New Breed of Malware

DeepLocker has changed the game of malware evasion by taking a fundamentally different approach from any other current evasive and targeted malware. Here’s what you need to know.

The post DeepLocker: How AI Can Power a Stealthy New Breed of Malware appeared first on Security Intelligence.

Continue reading DeepLocker: How AI Can Power a Stealthy New Breed of Malware

An In-Depth Guide to Application Modernization and Cloud Security

Security remains the primary concern for many CIOs in adopting hybrid IT and cloud technologies as they pursue application modernization.

The post An In-Depth Guide to Application Modernization and Cloud Security appeared first on Security Intelligence.

Continue reading An In-Depth Guide to Application Modernization and Cloud Security

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3

An attacker who gains access won’t necessarily walk away with an organization’s proprietary data. Here’s how a cyberattack framework can help you subvert an attacker already in a network.

The post How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3 appeared first on Security Intelligence.

Continue reading How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3

The State of Cybersecurity: A CISO and CTO Dish on AI, Emerging Threats, Crisis Leadership and More

Sridhar Muppidi, CTO of cloud security and IAM at IBM Security, and Shamla Naidoo, global CISO at IBM, took time to discuss topics ranging from AI and blockchain to threat sharing and collaboration.

The post The State of Cybersecurity: A CISO and CTO Dish on AI, Emerging Threats, Crisis Leadership and More appeared first on Security Intelligence.

Continue reading The State of Cybersecurity: A CISO and CTO Dish on AI, Emerging Threats, Crisis Leadership and More

How to Get the Most Out of DEF CON and Black Hat 2018

The IBM X-Force Red team is well-represented at DEF CON and Black Hat 2018, hosting sessions and panels about smart city security, vulnerability management and more.

The post How to Get the Most Out of DEF CON and Black Hat 2018 appeared first on Security Intelligence.

Continue reading How to Get the Most Out of DEF CON and Black Hat 2018

Gartner Releases First-Ever Magic Quadrant for Unified Endpoint Management (UEM)

IBM was named a leader in the 2018 Magic Quadrant for Unified Endpoint Management Tools report for its completeness of vision and ability to execute.

The post Gartner Releases First-Ever Magic Quadrant for Unified Endpoint Management (UEM) appeared first on Security Intelligence.

Continue reading Gartner Releases First-Ever Magic Quadrant for Unified Endpoint Management (UEM)

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2

In the external reconnaissance and launch attack phases of the X-Force IRIS cyberattack preparation framework, threat actors look for vulnerabilities and tailor their attacks to exploit them.

The post How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2 appeared first on Security Intelligence.

Continue reading How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2

How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1

The IBM X-Force IRIS cyberattack preparation and execution frameworks aim to help security teams predict threat actors’ motives and tactics and communicate security intelligence more clearly.

The post How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1 appeared first on Security Intelligence.

Continue reading How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1

As Seen on TV: Important Lessons for Winning the Fight Against Cybercrime

The Science Channel documentary, “Dark Web: Fighting Cybercrime,” shows why practice runs are essential to help security teams and business leaders keep their cool in the face of a cyberattack.

The post As Seen on TV: Important Lessons for Winning the Fight Against Cybercrime appeared first on Security Intelligence.

Continue reading As Seen on TV: Important Lessons for Winning the Fight Against Cybercrime

Cost of data breaches rises, mega breaches cost up to $350 million

Hidden costs in data breaches – such as lost business, negative impact on reputation and employee time spent on recovery – are difficult and expensive to manage. For example, a new study found that one-third of the cost of mega breaches (over 1 million… Continue reading Cost of data breaches rises, mega breaches cost up to $350 million