Five Steps for Investigating and Responding to Employee Fraud

In the rush to deflect blame in the wake of an insider attack, many organizations fail to answer critical questions that could help them avoid similar cases of employee fraud in the future.

The post Five Steps for Investigating and Responding to Employee Fraud appeared first on Security Intelligence.

Continue reading Five Steps for Investigating and Responding to Employee Fraud

The Grasshopper, the Ants and the Incident Response Plan

The passive Grasshopper should be more like the Ants, who use IBM Resilient to support their robust and comprehensive incident response plan.

The post The Grasshopper, the Ants and the Incident Response Plan appeared first on Security Intelligence.

Continue reading The Grasshopper, the Ants and the Incident Response Plan

The Emperor’s New Insider Threats

The Emperor was the greatest CISO in the land. His castle was as safe as could be, and there were no insider threats to be found — or so he thought.

The post The Emperor’s New Insider Threats appeared first on Security Intelligence.

Continue reading The Emperor’s New Insider Threats

Diving Deeper to Understand, Investigate and Mitigate Cyberthreats

Investigative analysis tools enable SOC teams to proactively hunt for and mitigate cyberthreats instead of meticulously collecting and curating data.

The post Diving Deeper to Understand, Investigate and Mitigate Cyberthreats appeared first on Security Intelligence.

Continue reading Diving Deeper to Understand, Investigate and Mitigate Cyberthreats

Investigating IoT Crime in the Age of Connected Devices

To fight IoT crime, security professionals must properly classify incidents and connect seemingly disparate strings of evidence.

The post Investigating IoT Crime in the Age of Connected Devices appeared first on Security Intelligence.

Continue reading Investigating IoT Crime in the Age of Connected Devices

How an Effective Incident Response Plan Can Help You Predict Your Security Future

An incident response plan and thorough analysis of historical threat data can help security teams predict how fraudsters might breach their networks.

The post How an Effective Incident Response Plan Can Help You Predict Your Security Future appeared first on Security Intelligence.

Continue reading How an Effective Incident Response Plan Can Help You Predict Your Security Future

The CISO’s Guide to Managing Insider Threats

To effectively manage and remediate insider threats, the CISO must establish a comprehensive approach to governance, data analysis and incident response.

The post The CISO’s Guide to Managing Insider Threats appeared first on Security Intelligence.

Continue reading The CISO’s Guide to Managing Insider Threats

Security Monitoring and Analytics: Faster Time to Action

Security monitoring and analytics platforms deliver business value by reducing the time it takes to identify, investigate and remediate threats.

The post Security Monitoring and Analytics: Faster Time to Action appeared first on Security Intelligence.

Continue reading Security Monitoring and Analytics: Faster Time to Action

Security Monitoring and Analytics: From Tools to Platforms

An evolved security monitoring and analytics platform — as opposed to a tools-based approach — can help analysts make better use of available threat data.

The post Security Monitoring and Analytics: From Tools to Platforms appeared first on Security Intelligence.

Continue reading Security Monitoring and Analytics: From Tools to Platforms

Smart Forensics for the Internet of Things (IoT)

The expanding Internet of Things brings new attack vectors, and cybersecurity experts will need new methods of incident response and forensics to keep up.

The post Smart Forensics for the Internet of Things (IoT) appeared first on Security Intelligence.

Continue reading Smart Forensics for the Internet of Things (IoT)