Surfing the Tsunami of Threat Data With Cognitive Security

Nowadays, most organizations’ networks are under constant attack. Cognitive security is the key to locating IoCs within the tsunami of threat intelligence.

The post Surfing the Tsunami of Threat Data With Cognitive Security appeared first on Security Intelligence.

Continue reading Surfing the Tsunami of Threat Data With Cognitive Security

Andromeda: A Galaxy of Pain, Coming to a Machine Near You

The IBM X-Force team analyzed the Andromeda malware and determined that its operators have shifted their attention to the payment card industry.

The post Andromeda: A Galaxy of Pain, Coming to a Machine Near You appeared first on Security Intelligence.

Continue reading Andromeda: A Galaxy of Pain, Coming to a Machine Near You

Use Email to Manage Threat Intelligence Collections

The IBM X-Force Exchange includes an email inbox feature that cuts down on information overload and enables analysts to easily share threat intelligence.

The post Use Email to Manage Threat Intelligence Collections appeared first on Security Intelligence.

Continue reading Use Email to Manage Threat Intelligence Collections

Do Threat Intelligence Exchanges Really Work?

Threat intelligence exchanges enable companies to detect and respond to incidents more effectively, but only if they take the necessary steps to prepare.

The post Do Threat Intelligence Exchanges Really Work? appeared first on Security Intelligence.

Continue reading Do Threat Intelligence Exchanges Really Work?

Showcasing Threat Intelligence at IBM InterConnect

At InterConnect 2017, experts will demonstrate how IBM is applying Watson for Cyber Security to take threat intelligence to the next level.

The post Showcasing Threat Intelligence at IBM InterConnect appeared first on Security Intelligence.

Continue reading Showcasing Threat Intelligence at IBM InterConnect

The Role of the Security Intelligence Analyst and the Three Main Elements of Cybersecurity

Security intelligence analysts must know the three elements of cybersecurity — threat intelligence, event intelligence and enrichment — to thwart threats.

The post The Role of the Security Intelligence Analyst and the Three Main Elements of Cybersecurity appeared first on Security Intelligence.

Continue reading The Role of the Security Intelligence Analyst and the Three Main Elements of Cybersecurity

Dridex’s Cold War: Enter AtomBombing

IBM X-Force researchers discovered that an upgraded version of Dridex has been using a new injection method, signifying the Trojan’s continued evolution.

The post Dridex’s Cold War: Enter AtomBombing appeared first on Security Intelligence.

Continue reading Dridex’s Cold War: Enter AtomBombing

Can You Inoculate Your Organization Against Cybercrime?

A cybersecurity immune system can “inoculate” your organization against attacks by ingesting and using the latest threat intelligence.

The post Can You Inoculate Your Organization Against Cybercrime? appeared first on Security Intelligence.

Continue reading Can You Inoculate Your Organization Against Cybercrime?

Can You Inoculate Your Organization Against Cybercrime?

A cybersecurity immune system can “inoculate” your organization against attacks by ingesting and using the latest threat intelligence.

The post Can You Inoculate Your Organization Against Cybercrime? appeared first on Security Intelligence.

Continue reading Can You Inoculate Your Organization Against Cybercrime?

Bringing the Power of Watson and Cognitive Computing to the Security Operations Center

The power of Watson and cognitive computing enables security operations center specialists to defend their environments against threats with confidence.

The post Bringing the Power of Watson and Cognitive Computing to the Security Operations Center appeared first on Security Intelligence.

Continue reading Bringing the Power of Watson and Cognitive Computing to the Security Operations Center