Identifying Named Pipe Impersonation and Other Malicious Privilege Escalation Techniques

Security analysts can nip many cyberattacks in the bud by monitoring for named pipe impersonation and other activity indicative of privilege escalation.

The post Identifying Named Pipe Impersonation and Other Malicious Privilege Escalation Techniques appeared first on Security Intelligence.

Continue reading Identifying Named Pipe Impersonation and Other Malicious Privilege Escalation Techniques

Rinse, Wash, Repeat: Defining, Planning and Continuously Improving Your SIEM Strategy

For security leaders, the process of defining an SIEM strategy is never complete. A successful deployment requires careful planning, regular review and a culture of continuous improvement.

The post Rinse, Wash, Repeat: Defining, Planning and Continuously Improving Your SIEM Strategy appeared first on Security Intelligence.

Continue reading Rinse, Wash, Repeat: Defining, Planning and Continuously Improving Your SIEM Strategy

Take a Dive: Deep Network Insights for Deeper Analytics

Security analysts need access to deep network insights in the form of user behavior analytics to unlock the full potential of technologies such as artificial intelligence and machine learning.

The post Take a Dive: Deep Network Insights for Deeper Analytics appeared first on Security Intelligence.

Continue reading Take a Dive: Deep Network Insights for Deeper Analytics

Readying Your Security Operations for 2018 and Beyond

If you are planning to launch a new deployment or otherwise expand your security operations center (SOC) in 2018, ensure that cognitive technologies are available to help analysts digest threat data.

The post Readying Your Security Operations for 2018 and Beyond appeared first on Security Intelligence.

Continue reading Readying Your Security Operations for 2018 and Beyond

Does Your SIEM Need More Cowbell?

IBM QRadar offers all the bells and whistles — and cowbell — security teams need to enhance their SIEM capabilities without paying an arm and a leg.

The post Does Your SIEM Need More Cowbell? appeared first on Security Intelligence.

Continue reading Does Your SIEM Need More Cowbell?

Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition

At IRISSCON 2017, 48 contestants across 12 teams battled it out in a free-for-all CTF competition to test their hacking, defending and forensics skills.

The post Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition appeared first on Security Intelligence.

Continue reading Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition

Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition

At IRISSCON 2017, 48 contestants across 12 teams battled it out in a free-for-all CTF competition to test their hacking, defending and forensics skills.

The post Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition appeared first on Security Intelligence.

Continue reading Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition

IBM Security Increases Its Leadership Position in the Gartner 2017 SIEM Magic Quadrant

IBM Security was named a leader in Gartner’s 2017 Magic Quadrant for SIEM, an honor that reflects IBM’s continued commitment to innovation in the field.

The post IBM Security Increases Its Leadership Position in the Gartner 2017 SIEM Magic Quadrant appeared first on Security Intelligence.

Continue reading IBM Security Increases Its Leadership Position in the Gartner 2017 SIEM Magic Quadrant

The Evolution of the SIEM

SIEM technology has evolved drastically over the past decade and will continue to mature as the threat landscape shifts and customers’ needs change.

The post The Evolution of the SIEM appeared first on Security Intelligence.

Continue reading The Evolution of the SIEM

All Aboard! Applying the Security Immune System Approach to the Railroad Industry

When it comes to protecting the railroad industry from cyberthreats, the security immune system approach can reduce incident triage from months to minutes.

The post All Aboard! Applying the Security Immune System Approach to the Railroad Industry appeared first on Security Intelligence.

Continue reading All Aboard! Applying the Security Immune System Approach to the Railroad Industry