Securing Human Endpoints Through Cyber Situational Awareness

Humans represent the weakest link in the cybersecurity chain. An effective defense strategy starts and ends with cyber situational awareness.

The post Securing Human Endpoints Through Cyber Situational Awareness appeared first on Security Intelligence.

Continue reading Securing Human Endpoints Through Cyber Situational Awareness

2016: The Year of the DDoS Attack

In 2016, the year of the DDoS attack, cybercriminals hijacked millions of IoT devices to create massive botnets they used to take down popular websites.

The post 2016: The Year of the DDoS Attack appeared first on Security Intelligence.

Continue reading 2016: The Year of the DDoS Attack

2016: The Year of the DDoS Attack

In 2016, the year of the DDoS attack, cybercriminals hijacked millions of IoT devices to create massive botnets they used to take down popular websites.

The post 2016: The Year of the DDoS Attack appeared first on Security Intelligence.

Continue reading 2016: The Year of the DDoS Attack

Ransomware Report: Top Security Threat Expected to Continue Rising in 2017

To pay or not to pay? When it comes to ransomware, that is the question. Despite a rise in attacks, organizations are largely unaware of the threat.

The post Ransomware Report: Top Security Threat Expected to Continue Rising in 2017 appeared first on Security Intelligence.

Continue reading Ransomware Report: Top Security Threat Expected to Continue Rising in 2017

Avoiding Threat Management Rookie Mistakes

Two recent cyberattacks against global companies and services demonstrated the need for better threat management practices and awareness.

The post Avoiding Threat Management Rookie Mistakes appeared first on Security Intelligence.

Continue reading Avoiding Threat Management Rookie Mistakes

How to Find and Remediate Vulnerabilities in Real Time

IT managers should take advantage of the many resources available to help them monitor, manage and ultimately remediate vulnerabilities.

The post How to Find and Remediate Vulnerabilities in Real Time appeared first on Security Intelligence.

Continue reading How to Find and Remediate Vulnerabilities in Real Time

The Power of Network Insights: Nowhere for Threats to Hide

IBM QRadar Network Insights enables security professionals to analyze historical threat data and identify indicators of malicious activity in real time.

The post The Power of Network Insights: Nowhere for Threats to Hide appeared first on Security Intelligence.

Continue reading The Power of Network Insights: Nowhere for Threats to Hide

The Threat Model of 2017

If a threat model assumes a system is operating within certain parameters, changes in the threat environment could trigger unintended second-order effects.

The post The Threat Model of 2017 appeared first on Security Intelligence.

Continue reading The Threat Model of 2017

Detect Endpoint Threats by Analyzing Process Logs in QRadar

Using an SIEM solution such as QRadar, security professionals can analyze process logs to detect, hunt and trace the source of threats.

The post Detect Endpoint Threats by Analyzing Process Logs in QRadar appeared first on Security Intelligence.

Continue reading Detect Endpoint Threats by Analyzing Process Logs in QRadar

MSS Offerings: Looking Under the Hood

IT managers should consider a provider’s quality of SOC staffing, flexibility and ability to meet business objectives when comparing MSS offerings.

The post MSS Offerings: Looking Under the Hood appeared first on Security Intelligence.

Continue reading MSS Offerings: Looking Under the Hood