IBM X-Force Red Turns 1, Expands Into Auto and IoT Practice Areas

Today IBM X-Force Red launches a collaboration with the Watson IoT Platform to help ensure that all IoT solutions get our special brand of hacker love.

The post IBM X-Force Red Turns 1, Expands Into Auto and IoT Practice Areas appeared first on Security Intelligence.

Continue reading IBM X-Force Red Turns 1, Expands Into Auto and IoT Practice Areas

Information and Communication Technology (ICT) Industry: Second-Most Attacked Sector in 2016

The information and communication technology (ICT) industry suffered the second-most attacks out of all sectors monitored by IBM X-Force in 2016.

The post Information and Communication Technology (ICT) Industry: Second-Most Attacked Sector in 2016 appeared first on Security Intelligence.

Continue reading Information and Communication Technology (ICT) Industry: Second-Most Attacked Sector in 2016

Manufacturing Security Incidents: Forty Percent Higher Than Cross-Industry Average in 2016

In manufacturing, security incidents occurred at a rate 40 percent higher than the average across all other industries in 2016, according to X-Force data.

The post Manufacturing Security Incidents: Forty Percent Higher Than Cross-Industry Average in 2016 appeared first on Security Intelligence.

Continue reading Manufacturing Security Incidents: Forty Percent Higher Than Cross-Industry Average in 2016

How IoT Data Analytics Will Give Businesses a Competitive Edge

Given the growing number of connected devices, organizations are beginning to leverage IoT data analytics to drive better decision-making.

The post How IoT Data Analytics Will Give Businesses a Competitive Edge appeared first on Security Intelligence.

Continue reading How IoT Data Analytics Will Give Businesses a Competitive Edge

IoT Security: Who Is Stepping Up?

Government agencies, customers and device manufacturers must develop better IoT security practices to protect the growing number of connected devices.

The post IoT Security: Who Is Stepping Up? appeared first on Security Intelligence.

Continue reading IoT Security: Who Is Stepping Up?

IoT Security: Who Is Stepping Up?

Government agencies, customers and device manufacturers must develop better IoT security practices to protect the growing number of connected devices.

The post IoT Security: Who Is Stepping Up? appeared first on Security Intelligence.

Continue reading IoT Security: Who Is Stepping Up?

In 2017, Blockchain Gets Serious

Formerly only associated with cryptocurrencies such as Bitcoin, blockchain technology will come of age in 2017, yielding use cases across industries.

The post In 2017, Blockchain Gets Serious appeared first on Security Intelligence.

Continue reading In 2017, Blockchain Gets Serious

The Indian IoT Market Is Exploding Despite Gaping Security Holes

The rapid growth of the Indian IoT market is encouraging, but more connected devices mean more vulnerabilities for cybercriminals to exploit.

The post The Indian IoT Market Is Exploding Despite Gaping Security Holes appeared first on Security Intelligence.

Continue reading The Indian IoT Market Is Exploding Despite Gaping Security Holes

Insider Threats, Industrial Sabotage and Game Theory: Part 2

When it comes to securing industrial IT environments, the implications of game theory vary depending on whether the parties cooperate, collude or defect.

The post Insider Threats, Industrial Sabotage and Game Theory: Part 2 appeared first on Security Intelligence.

Continue reading Insider Threats, Industrial Sabotage and Game Theory: Part 2

Redefining Digital Interactions in Asia-Pacific With Blockchain Technology

Widespread adoption of blockchain technology could help Asia-Pacific countries streamline ineffective processes related to logistics, trade and more.

The post Redefining Digital Interactions in Asia-Pacific With Blockchain Technology appeared first on Security Intelligence.

Continue reading Redefining Digital Interactions in Asia-Pacific With Blockchain Technology