IBM Veteran Training: Service Members Shine in Cyber Crisis Management Training

As the cybersecurity industry is challenged with a growing skills gap, IBM and CASY are offering cybersecurity training for veterans through the Veterans Accelerator program.

The post IBM Veteran Training: Service Members Shine in Cyber Crisis Management Training appeared first on Security Intelligence.

Continue reading IBM Veteran Training: Service Members Shine in Cyber Crisis Management Training

7 Ways to Identify Darknet Cybersecurity Risks

Explore seven characteristics of security risk from the dark and hidden web. Learn how organizations can capture the latent value of dark-sourced threat intelligence.

The post 7 Ways to Identify Darknet Cybersecurity Risks appeared first on Security Intelligence.

Continue reading 7 Ways to Identify Darknet Cybersecurity Risks

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3

An attacker who gains access won’t necessarily walk away with an organization’s proprietary data. Here’s how a cyberattack framework can help you subvert an attacker already in a network.

The post How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3 appeared first on Security Intelligence.

Continue reading How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3

5 Ways to Improve Collaboration Among Security Professionals

Security professionals are not sharing intelligence as effectively as threat actors. The community can build a safer digital future for everyone by adopting more collaborative strategies.

The post 5 Ways to Improve Collaboration Among Security Professionals appeared first on Security Intelligence.

Continue reading 5 Ways to Improve Collaboration Among Security Professionals

How to Get the Most Out of DEF CON and Black Hat 2018

The IBM X-Force Red team is well-represented at DEF CON and Black Hat 2018, hosting sessions and panels about smart city security, vulnerability management and more.

The post How to Get the Most Out of DEF CON and Black Hat 2018 appeared first on Security Intelligence.

Continue reading How to Get the Most Out of DEF CON and Black Hat 2018

Bridging the Divided Perspectives on SOC Tech and Talent

There’s a significant divide between perceptions of SOC technology, talent and other key operations issues among analysts, directors and executives, according to the findings of a recent report.

The post Bridging the Divided Perspectives on SOC Tech and Talent appeared first on Security Intelligence.

Continue reading Bridging the Divided Perspectives on SOC Tech and Talent

Four Steps to Close the Window on Critical Vulnerabilities

Critical vulnerabilities often remain unaddressed when an organization is unwilling to allocate resources to routinely update applications. Take steps now to secure your network against exploitation.

The post Four Steps to Close the Window on Critical Vulnerabilities appeared first on Security Intelligence.

Continue reading Four Steps to Close the Window on Critical Vulnerabilities

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2

In the external reconnaissance and launch attack phases of the X-Force IRIS cyberattack preparation framework, threat actors look for vulnerabilities and tailor their attacks to exploit them.

The post How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2 appeared first on Security Intelligence.

Continue reading How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2

How Open Source Intelligence Could Save Your Network

Open source intelligence enables analysts to identify threats and uncover details about attacker behavior to improve their decision-making around incident response.

The post How Open Source Intelligence Could Save Your Network appeared first on Security Intelligence.

Continue reading How Open Source Intelligence Could Save Your Network

How Pivoting Can Help Your Incident Response Process

Indicators of compromise are key data points used during an incident response process. Regularly testing the reliability of your indicators can make all the difference in your IT security process.

The post How Pivoting Can Help Your Incident Response Process appeared first on Security Intelligence.

Continue reading How Pivoting Can Help Your Incident Response Process