Finding the Right Apps to Streamline Data Collection

The IBM Security App Exchange includes over 70 applications to help security teams streamline data collection and share information more efficiently.

The post Finding the Right Apps to Streamline Data Collection appeared first on Security Intelligence.

Continue reading Finding the Right Apps to Streamline Data Collection

Changing of the Guard: Three Considerations for Your Next IPS Purchase

Recent changes in the security market have influenced many IT professionals to focus on the long-term success of their programs when shopping for an IPS.

The post Changing of the Guard: Three Considerations for Your Next IPS Purchase appeared first on Security Intelligence.

Continue reading Changing of the Guard: Three Considerations for Your Next IPS Purchase

Lessons From the Dyn DDoS Attack

Domain name provider Dyn suffered the largest DDoS attack in history on Oct. 21. DDoS is nothing new, but the attack highlights some alarming trends.

The post Lessons From the Dyn DDoS Attack appeared first on Security Intelligence.

Continue reading Lessons From the Dyn DDoS Attack

Global City CIOs Launch New Organization to Promote Best Smart City Practices

A group of IT leaders from around the world formed the Council of Global City CIOs to promote information sharing when it comes to smart city initiatives.

The post Global City CIOs Launch New Organization to Promote Best Smart City Practices appeared first on Security Intelligence.

Continue reading Global City CIOs Launch New Organization to Promote Best Smart City Practices

Adopting IaaS: Tips and Best Practices for Cloud Transformation

Many organizations are choosing to adopt cloud and hybrid cloud architectures to integrate with infrastructure-as-a-service (IaaS) solutions.

The post Adopting IaaS: Tips and Best Practices for Cloud Transformation appeared first on Security Intelligence.

Continue reading Adopting IaaS: Tips and Best Practices for Cloud Transformation

Pros and Cons of Building and Maintaining In-House Pen Testing Capability

Security leaders must weigh the convenience and speed of in-house pen testing against the cost of maintaining a team to conduct security tests.

The post Pros and Cons of Building and Maintaining In-House Pen Testing Capability appeared first on Security Intelligence.

Continue reading Pros and Cons of Building and Maintaining In-House Pen Testing Capability

No Business Is Too Small for SMB Cybersecurity

Smaller businesses, like the HVAC company that caused the Target penetration in 2013, often think they are too small to be security targets, but SMB cybersecurity can have big implications. Size doesn’t matter as long as your firm has something of value that someone thinks is worth stealing, or a connection that someone thinks is […]

The post No Business Is Too Small for SMB Cybersecurity appeared first on Security Intelligence.

Continue reading No Business Is Too Small for SMB Cybersecurity

Security Interns Help to Create a Global IBM Hacking Competition

A group of interns collaborated with experts on the IBM Managed Security Services team to create a global IBM hacking competition.

The post Security Interns Help to Create a Global IBM Hacking Competition appeared first on Security Intelligence.

Continue reading Security Interns Help to Create a Global IBM Hacking Competition

Use a Malware Simulator to Better Defend Against Ransomware

A malware simulator like the Shinosec ShinoLocker suite can help penetration testers understand how malware works and practice defending their systems.

The post Use a Malware Simulator to Better Defend Against Ransomware appeared first on Security Intelligence.

Continue reading Use a Malware Simulator to Better Defend Against Ransomware

What a WWII Mathematician Might See When Looking at Your Critical IT Assets

Instead of pouring resources into total security, professionals should focus on protecting critical IT assets and strengthening their weak spots.

The post What a WWII Mathematician Might See When Looking at Your Critical IT Assets appeared first on Security Intelligence.

Continue reading What a WWII Mathematician Might See When Looking at Your Critical IT Assets