The Day MegaCortex Ransomware Mayhem Was Averted

IBM X-Force IRIS investigated a recent MegaCortex ransomware attack that highlights the benefits of reporting early and escalating suspicious indicators to responders.

The post The Day MegaCortex Ransomware Mayhem Was Averted appeared first on Security Intelligence.

Continue reading The Day MegaCortex Ransomware Mayhem Was Averted

Sound Advice: Our 2019 International Podcast Day Roundup

Sept. 30 is International Podcast Day. Here’s a roundup of this year’s most interesting and insightful SecurityIntelligence podcasts.

The post Sound Advice: Our 2019 International Podcast Day Roundup appeared first on Security Intelligence.

Continue reading Sound Advice: Our 2019 International Podcast Day Roundup

Now’s the Time to Shift From Defense in Depth to Security in Depth

In today’s threat landscape, where many cybercriminals are sophisticated enough to circumvent layered safeguards, the old defense-in-depth approach is due for an upgrade.

The post Now’s the Time to Shift From Defense in Depth to Security in Depth appeared first on Security Intelligence.

Continue reading Now’s the Time to Shift From Defense in Depth to Security in Depth

How Analysts Connect Threat Intelligence Sources to Make Investigations More Efficient

Organizations in the private sector are adopting link analysis tools that automatically gather disparate sources of threat intelligence on a single pane of glass.

The post How Analysts Connect Threat Intelligence Sources to Make Investigations More Efficient appeared first on Security Intelligence.

Continue reading How Analysts Connect Threat Intelligence Sources to Make Investigations More Efficient

What Is Unified Threat Management? A Pragmatic Approach to Information Security

Organizations are spending on security, but threat vectors continue to evolve. Unified threat management tools offer a way to bridge the gap.

The post What Is Unified Threat Management? A Pragmatic Approach to Information Security appeared first on Security Intelligence.

Continue reading What Is Unified Threat Management? A Pragmatic Approach to Information Security

Night Vision: Navigating the Darknet for Improved Threat Intelligence

Reading Time: 4 minutes Securely accessing the darknet can help organizations overhear criminal conversations, find actionable data, look for evidence of compromise, build better defenses and uncover critical user risks.

The post Night Vision: Navigating the Darknet for Improved Threat Intelligence appeared first on Security Intelligence.

Continue reading Night Vision: Navigating the Darknet for Improved Threat Intelligence

10 Surprisingly Bright Spots on the Darknet

Reading Time: 4 minutes The darknet isn’t all creepy, illegal content. In between criminal marketplaces and hacker forums, there’s a few hidden websites that exist for legitimate purposes.

The post 10 Surprisingly Bright Spots on the Darknet appeared first on Security Intelligence.

Continue reading 10 Surprisingly Bright Spots on the Darknet

Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention

Reading Time: 4 minutes If CISOs could make one cybersecurity issue vanish, malware would top the list. While there’s no silver-bullet solutions, the world of magic offers insights for effective malware prevention.

The post Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention appeared first on Security Intelligence.

Continue reading Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention

What Are Advanced Persistent Threats (APTs), and How Do You Find Them?

Reading Time: 4 minutes Companies are constrained by insufficient time and resources to detect and respond to advanced persistent threats (APTs). How can SOCs fill the gaps and keep advanced attackers out of their networks?

The post What Are Advanced Persistent Threats (APTs), and How Do You Find Them? appeared first on Security Intelligence.

Continue reading What Are Advanced Persistent Threats (APTs), and How Do You Find Them?

What Is Security Intelligence? Here’s What Your Business Leaders Want to Know

Reading Time: 3 minutes How do you explain security intelligence to your COO? In today’s heightened threat landscape, where business leaders are reading about breaches in the news every day, it’s crucial to do your homework.

The post What Is Security Intelligence? Here’s What Your Business Leaders Want to Know appeared first on Security Intelligence.

Continue reading What Is Security Intelligence? Here’s What Your Business Leaders Want to Know