Overcoming the Security Side-Eye: Making Collaborative Threat Intelligence Work

To effectively share threat intelligence, security professionals must develop processes, resources and trust relationships with other industry players.

The post Overcoming the Security Side-Eye: Making Collaborative Threat Intelligence Work appeared first on Security Intelligence.

Continue reading Overcoming the Security Side-Eye: Making Collaborative Threat Intelligence Work

Around the World With Zeus Sphinx: From Canada to Australia and Back

For the first time, IBM X-Force Researchers reported Zeus Sphinx activity targeting banks and financial institutions in Canada and Australia.

The post Around the World With Zeus Sphinx: From Canada to Australia and Back appeared first on Security Intelligence.

Continue reading Around the World With Zeus Sphinx: From Canada to Australia and Back

Expanding Threat Intelligence in IBM X-Force Exchange

The Threat Feed Manager tool in X-Force Exchange enables analysts to integrate threat intelligence data into collections to share with the IT community.

The post Expanding Threat Intelligence in IBM X-Force Exchange appeared first on Security Intelligence.

Continue reading Expanding Threat Intelligence in IBM X-Force Exchange

Turn Scrap Paper Into Security Investigations With IBM X-Force Threat Intelligence

IBM added a Collections feature to its X-Force Exchange that enables researchers to share reports and engage in collaborative defense.

The post Turn Scrap Paper Into Security Investigations With IBM X-Force Threat Intelligence appeared first on Security Intelligence.

Continue reading Turn Scrap Paper Into Security Investigations With IBM X-Force Threat Intelligence

Save Time by Accessing Multiple Threat Intelligence Streams at Once

IBM created an external threat feed manager to work with the threat intelligence services and partnerships available in the X-Force Exchange.

The post Save Time by Accessing Multiple Threat Intelligence Streams at Once appeared first on Security Intelligence.

Continue reading Save Time by Accessing Multiple Threat Intelligence Streams at Once

TrickBot Redirection Attacks Launched in Canada

TrickBot has developed new attack methods specifically designed to target banks in Canada in addition to its established targets in the U.K. and Australia.

The post TrickBot Redirection Attacks Launched in Canada appeared first on Security Intelligence.

Continue reading TrickBot Redirection Attacks Launched in Canada

Track Relevant Vulnerabilities With Watchlists

The watchlist feature on IBM X-Force Exchange enables network administrators to maintain accurate asset inventories and track relevant vulnerabilities.

The post Track Relevant Vulnerabilities With Watchlists appeared first on Security Intelligence.

Continue reading Track Relevant Vulnerabilities With Watchlists

Track Relevant Vulnerabilities With Watchlists

The watchlist feature on IBM X-Force Exchange enables network administrators to maintain accurate asset inventories and track relevant vulnerabilities.

The post Track Relevant Vulnerabilities With Watchlists appeared first on Security Intelligence.

Continue reading Track Relevant Vulnerabilities With Watchlists

Behavior Analytics: The Right Ingredient to Combat Insider Threats

Cybersecurity threats come from all sides — even from within the network. Behavior analytics empowers IT teams with full visibility across the IT ecosystem.

The post Behavior Analytics: The Right Ingredient to Combat Insider Threats appeared first on Security Intelligence.

Continue reading Behavior Analytics: The Right Ingredient to Combat Insider Threats

Podcast: What’s So Great About Collaborative Defense?

In the latest edition of the Security Intelligence podcast, IBM’s Pam Cobb discusses the many benefits of collaborative defense.

The post Podcast: What’s So Great About Collaborative Defense? appeared first on Security Intelligence.

Continue reading Podcast: What’s So Great About Collaborative Defense?