Stopping Threats in Their Tracks With Proactive Monitoring

An effective response to an advanced threat such as WannaCry can be broken down into two phases: vulnerability management and proactive monitoring.

The post Stopping Threats in Their Tracks With Proactive Monitoring appeared first on Security Intelligence.

Continue reading Stopping Threats in Their Tracks With Proactive Monitoring

Unapplied Knowledge: Using Endpoint Intelligence to Earn an A-Plus in Security

Security professionals can now add the previously unapplied knowledge from IBM BigFix to the existing set of data available through QRadar.

The post Unapplied Knowledge: Using Endpoint Intelligence to Earn an A-Plus in Security appeared first on Security Intelligence.

Continue reading Unapplied Knowledge: Using Endpoint Intelligence to Earn an A-Plus in Security

The Cognitive Analyst and Artificial Intelligence

It’s natural for security professionals to be nervous, but Watson is designed to augment the role of the cognitive analyst, not replace it entirely.

The post The Cognitive Analyst and Artificial Intelligence appeared first on Security Intelligence.

Continue reading The Cognitive Analyst and Artificial Intelligence

Address Registry and File Activity Monitoring Requirements With the Snare Log Analysis App

The Snare Log Analysis App offers security analysts an extra pair of eyes to help them analyze SIEM logs and meet file activity monitoring requirements.

The post Address Registry and File Activity Monitoring Requirements With the Snare Log Analysis App appeared first on Security Intelligence.

Continue reading Address Registry and File Activity Monitoring Requirements With the Snare Log Analysis App

Qradar Advisor With Watson Makes Cybersecurity More Human

QRadar Advisor with Watson is not meant to replace humans in the SOC. Instead, it is designed to help analysts make better decisions more quickly.

The post Qradar Advisor With Watson Makes Cybersecurity More Human appeared first on Security Intelligence.

Continue reading Qradar Advisor With Watson Makes Cybersecurity More Human

UEBA: Canary in a Coal Mine

User entity behavioral analysis (UEBA) can provide analysts with actionable insights and early warnings of threats, much like a canary in a coal mine.

The post UEBA: Canary in a Coal Mine appeared first on Security Intelligence.

Continue reading UEBA: Canary in a Coal Mine

IoT: The Internet of Trouble

IBM is investing heavily in cognitive computing and other emerging technologies designed to help analysts secure the growing number of IoT devices.

The post IoT: The Internet of Trouble appeared first on Security Intelligence.

Continue reading IoT: The Internet of Trouble

Will Watson Save the Security World?

Can IBM QRadar Advisor with Watson save the world? We won’t know until it matures, but Watson has already shown great potential to assist SOC analysts.

The post Will Watson Save the Security World? appeared first on Security Intelligence.

Continue reading Will Watson Save the Security World?

Take the First Step Toward GDPR Compliance With the Right IBM QRadar App

With the right QRadar app, security professionals can get a head start on achieving GDPR compliance before the regulation takes effect in May 2018.

The post Take the First Step Toward GDPR Compliance With the Right IBM QRadar App appeared first on Security Intelligence.

Continue reading Take the First Step Toward GDPR Compliance With the Right IBM QRadar App

Becoming an Agile Cyber-Ninja: Implementing SIEM the Right Way in 2017

To get the most out of SIEM tools such as QRadar, security analysts should abandon the traditional Waterfall methodology and adopt the Agile approach.

The post Becoming an Agile Cyber-Ninja: Implementing SIEM the Right Way in 2017 appeared first on Security Intelligence.

Continue reading Becoming an Agile Cyber-Ninja: Implementing SIEM the Right Way in 2017