Want Fries With Your EXTRABACON or EPICBANANA? Cisco Addresses Two New Vulnerabilities

Cisco recently addressed two exploits that sound more like delicious drive-thru menu items than dangerous security risks: EXTRABACON and EPICBANANA.

The post Want Fries With Your EXTRABACON or EPICBANANA? Cisco Addresses Two New Vulnerabilities appeared first on Security Intelligence.

Continue reading Want Fries With Your EXTRABACON or EPICBANANA? Cisco Addresses Two New Vulnerabilities

Re-examining the IBM X-Force Exchange API

The X-Force Exchange API has undergone two significant changes since it went public in April 2015: Anonymous access disappeared and rate limits appeared.

The post Re-examining the IBM X-Force Exchange API appeared first on Security Intelligence.

Continue reading Re-examining the IBM X-Force Exchange API

Security Glue: How Threat Intelligence Binds Security Providers and Partners

Threat intelligence is the glue that holds security together. It helps create a picture of the most serious threats facing any organization.

The post Security Glue: How Threat Intelligence Binds Security Providers and Partners appeared first on Security Intelligence.

Continue reading Security Glue: How Threat Intelligence Binds Security Providers and Partners

Does the Security Industry Have an Immune System Problem?

Businesses need to build a cybersecurity immune system where various parts interact and work together to detect, prevent and eradicate breaches.

The post Does the Security Industry Have an Immune System Problem? appeared first on Security Intelligence.

Continue reading Does the Security Industry Have an Immune System Problem?

Threat Intelligence Currency in the API Economy

Threat intelligence is a critical source of information that can enrich most security products and defensive strategies.

The post Threat Intelligence Currency in the API Economy appeared first on Security Intelligence.

Continue reading Threat Intelligence Currency in the API Economy

The Next Big Thing: Who Drives the Security Agenda?

Cybercriminals may be the ones setting the security agenda, but security professionals can collaborate to defeat malicious actors and improve defenses.

The post The Next Big Thing: Who Drives the Security Agenda? appeared first on Security Intelligence.

Continue reading The Next Big Thing: Who Drives the Security Agenda?

Black Hats and White Hats: If Cybersecurity Were a Western

If white hats hope to outduel the black hats, they need to learn to collaborate and share information just as their enemies do.

The post Black Hats and White Hats: If Cybersecurity Were a Western appeared first on Security Intelligence.

Continue reading Black Hats and White Hats: If Cybersecurity Were a Western

Triple Threat: Engaging a Trifecta of Threat Intelligence From IBM X-Force

The newly launched IBM X-Force Incident Response Services completes the trifecta of actionable threat intelligence from IBM X-Force.

The post Triple Threat: Engaging a Trifecta of Threat Intelligence From IBM X-Force appeared first on Security Intelligence.

Continue reading Triple Threat: Engaging a Trifecta of Threat Intelligence From IBM X-Force