Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

No one needs to tell you that data breaches are costly. That data has been quantified and the numbers are staggering. In fact, the IBM Security Cost of a Data Breach estimates that the average cost of a data breach in 2022 was $4.35 million, with 83% of organizations experiencing one or more security incidents. […]

The post Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It appeared first on Security Intelligence.

Continue reading Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

How to Embed Gen Z in Your Organization’s Security Culture

Generation Z, which Pew Research Center defines as those born after 1996, is considered the first digital-native generation. This group of young people always has the latest technology at their fingertips. Yet even with this strong digital connection, the National Cybersecurity Alliance (NCSA) found that Gen Zers have higher cyber incident victimization rates than previous […]

The post How to Embed Gen Z in Your Organization’s Security Culture appeared first on Security Intelligence.

Continue reading How to Embed Gen Z in Your Organization’s Security Culture

Putting Your SOC in the Hot Seat

Today’s Security Operations Centers (SOCs) are being stress-tested as never before. As the heart of any organization’s cybersecurity apparatus, SOCs are the first line of defense, running 24/7 operations to watch for alerts of attacks and appropriately address those alerts before they become all-out crises. Yet with ransomware attacks maintaining first place as the top […]

The post Putting Your SOC in the Hot Seat appeared first on Security Intelligence.

Continue reading Putting Your SOC in the Hot Seat

X-Force Threat Intelligence: Monthly Malware Roundup

Today’s reality means that organizations need to be constantly vigilant against security breaches. Having a robust incident response plan in place is vital. IBM Security X-Force is a team dedicated to delivering the latest threat intelligence, research and analysis reports that help you manage risk in your organization. This monthly malware roundup offers a summary […]

The post X-Force Threat Intelligence: Monthly Malware Roundup appeared first on Security Intelligence.

Continue reading X-Force Threat Intelligence: Monthly Malware Roundup

Everyone Wants to Build a Cyber Range: Should You?

In the last few years, IBM X-Force has seen an unprecedented increase in requests to build cyber ranges. By cyber ranges, we mean facilities or online spaces that enable team training and exercises of cyberattack responses. Companies understand the need to drill their plans based on real-world conditions and using real tools, attacks and procedures. […]

The post Everyone Wants to Build a Cyber Range: Should You? appeared first on Security Intelligence.

Continue reading Everyone Wants to Build a Cyber Range: Should You?

3 Ransomware Threats in 2021 and How to Protect Against Them

I’m sure I’m not the only one who expected the world to magically get back to normal — whatever that is — when the ball dropped on 2021. After seeing a rise in threats last year, no more ransomware, or at least fewer attacks, was on my very long wish list for a wonderful new […]

The post 3 Ransomware Threats in 2021 and How to Protect Against Them appeared first on Security Intelligence.

Continue reading 3 Ransomware Threats in 2021 and How to Protect Against Them

Smell the Attack? Sensory-Immersive Cyber Range Training for Industry 4.0

Humanity has been through a number of industrial revolutions since the 1760s, and is now at its fourth cycle of sweeping industrial innovation, known as Industry 4.0. It is characterized by the ongoing automation of traditional manufacturing and industrial practices using modern smart technology. As such, it inherits risks and threats that apply to connected […]

The post Smell the Attack? Sensory-Immersive Cyber Range Training for Industry 4.0 appeared first on Security Intelligence.

Continue reading Smell the Attack? Sensory-Immersive Cyber Range Training for Industry 4.0

10 Reasons Cyber Range Simulation Is Vital to Incident Response

Reading Time: 4 minutes Is your incident response plan resilient when you’re under attack? Simulation in the cyber range can allow you to test how well you perform when it matters.

The post 10 Reasons Cyber Range Simulation Is Vital to Incident Response appeared first on Security Intelligence.

Continue reading 10 Reasons Cyber Range Simulation Is Vital to Incident Response

How Prepared Is the Financial Services Sector to Respond to a Systemic, Global Cyberattack?

Due to its interconnected nature, the financial services industry needs to prepare to respond to a systemic cyberattack that could impact its overarching infrastructure across borders.

The post How Prepared Is the Financial Services Sector to Respond to a Systemic, Global Cyberattack? appeared first on Security Intelligence.

Continue reading How Prepared Is the Financial Services Sector to Respond to a Systemic, Global Cyberattack?

Why Cybercriminals Are Targeting Travel and Transportation

Why are travel companies increasingly targeted in cyberattacks? Valuable data and customer hospitality demands make the travel and transportation industry especially tempting to cybercriminals.

The post Why Cybercriminals Are Targeting Travel and Transportation appeared first on Security Intelligence.

Continue reading Why Cybercriminals Are Targeting Travel and Transportation