Hello, My Name Is Space Rogue

IBM X-Force Red marked its first anniversary with the addition of security specialists, including Space Rogue, bolstering the team’s talent roster.

The post Hello, My Name Is Space Rogue appeared first on Security Intelligence.

Continue reading Hello, My Name Is Space Rogue

Accelerate Response With Orchestration

For organizations struggling to keep up with increasingly complex security incidents, orchestration can help streamline response processes.

The post Accelerate Response With Orchestration appeared first on Security Intelligence.

Continue reading Accelerate Response With Orchestration

Testing the security of connected cars and IOT devices

IBM Security announced the launch of two new security testing practice areas focused on automotive security and the Internet of Things (IOT). The new services will be delivered via a team of IBM X-Force Red researchers focused on testing backend processes, apps and physical hardware used to control access and management of smart systems. “Over the past year, we’ve seen security testing further emerge as a key component in clients’ security programs,” said Charles Henderson, … More Continue reading Testing the security of connected cars and IOT devices

IBM X-Force Red Turns 1, Expands Into Auto and IoT Practice Areas

Today IBM X-Force Red launches a collaboration with the Watson IoT Platform to help ensure that all IoT solutions get our special brand of hacker love.

The post IBM X-Force Red Turns 1, Expands Into Auto and IoT Practice Areas appeared first on Security Intelligence.

Continue reading IBM X-Force Red Turns 1, Expands Into Auto and IoT Practice Areas

A ‘Wiper’ in Ransomware Clothing: Global Attacks Intended for Destruction Versus Financial Gain

Further analysis of impacted Petya ransomware victims led our team to conclude that this attack was specifically aimed at organizations within Ukraine.

The post A ‘Wiper’ in Ransomware Clothing: Global Attacks Intended for Destruction Versus Financial Gain appeared first on Security Intelligence.

Continue reading A ‘Wiper’ in Ransomware Clothing: Global Attacks Intended for Destruction Versus Financial Gain

IBM Named a Leader in Inaugural Gartner Magic Quadrant for Access Management, Worldwide

Gartner recognized IBM as a Leader for its completeness of vision and ability to execute in the first ever Magic Quadrant for Access Management, Worldwide.

The post IBM Named a Leader in Inaugural Gartner Magic Quadrant for Access Management, Worldwide appeared first on Security Intelligence.

Continue reading IBM Named a Leader in Inaugural Gartner Magic Quadrant for Access Management, Worldwide

In Case You Missed the Memo: What’s New in IBM’s Application Security Testing?

New enhancements to IBM’s application security testing solutions enable clients to simplify SAST, remediate open source vulnerabilities and more.

The post In Case You Missed the Memo: What’s New in IBM’s Application Security Testing? appeared first on Security Intelligence.

Continue reading In Case You Missed the Memo: What’s New in IBM’s Application Security Testing?

Petya Weren’t Expecting This: Ransomware Takes Systems Hostage Across the Globe

It appears that the current Petya payload is being distributed using the same exploits that were part of the leaks that powered the spread of WannaCry.

The post Petya Weren’t Expecting This: Ransomware Takes Systems Hostage Across the Globe appeared first on Security Intelligence.

Continue reading Petya Weren’t Expecting This: Ransomware Takes Systems Hostage Across the Globe

Average data breach cost declines 10% globally

The average cost of a data breach is $3.62 million globally, a 10 percent decline from 2016 results. This is the first time since the global study was created that there has been an overall decrease in the cost. According to the study conducted by Ponemon Institute, these data breaches cost companies $141 per lost or stolen record on average. The average number of breached records by country or region Significant decrease in Europe Analyzing … More Continue reading Average data breach cost declines 10% globally

Changing How We Educate and Hire With a New Collar Approach

Who said you need a degree to work in IT? A new collar approach to recruiting can help organizations close the cybersecurity skills gap.

The post Changing How We Educate and Hire With a New Collar Approach appeared first on Security Intelligence.

Continue reading Changing How We Educate and Hire With a New Collar Approach