Game Over: Improving Your Cyber Analyst Workflow Through Gamification

Gamification is an engaging way to motivate security operations center analysts to develop their incident response skills and situational awareness.

The post Game Over: Improving Your Cyber Analyst Workflow Through Gamification appeared first on Security Intelligence.

Continue reading Game Over: Improving Your Cyber Analyst Workflow Through Gamification

A Brief History of Computing: As Technology Evolves, Cybersecurity Lags Behind

As computers evolved throughout history, developers repeatedly failed to build cybersecurity into the increasingly complex machines.

The post A Brief History of Computing: As Technology Evolves, Cybersecurity Lags Behind appeared first on Security Intelligence.

Continue reading A Brief History of Computing: As Technology Evolves, Cybersecurity Lags Behind

The Power of the Security Immune System

A security immune system is an integrated set of complimentary controls — not a single solution — working together to protect network data.

The post The Power of the Security Immune System appeared first on Security Intelligence.

Continue reading The Power of the Security Immune System

Securing Your Enterprise Assets While Traveling for Work

It is critical to ensure that the right policies and controls are in place to help defend enterprise assets before a business trip, on the go and at home.

The post Securing Your Enterprise Assets While Traveling for Work appeared first on Security Intelligence.

Continue reading Securing Your Enterprise Assets While Traveling for Work

Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications

Security intelligence solutions such as QRadar UBA enable analysts to detect potentially malicious activity on Microsoft Office 365 cloud-based apps.

The post Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications appeared first on Security Intelligence.

Continue reading Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications

Personalizing Energy Security With Robust Analytics

To deliver the level of personalization today’s prosumers demand, utilities must support their energy security strategies with predictive analytics.

The post Personalizing Energy Security With Robust Analytics appeared first on Security Intelligence.

Continue reading Personalizing Energy Security With Robust Analytics

Stopping Threats in Their Tracks With Proactive Monitoring

An effective response to an advanced threat such as WannaCry can be broken down into two phases: vulnerability management and proactive monitoring.

The post Stopping Threats in Their Tracks With Proactive Monitoring appeared first on Security Intelligence.

Continue reading Stopping Threats in Their Tracks With Proactive Monitoring

Unapplied Knowledge: Using Endpoint Intelligence to Earn an A-Plus in Security

Security professionals can now add the previously unapplied knowledge from IBM BigFix to the existing set of data available through QRadar.

The post Unapplied Knowledge: Using Endpoint Intelligence to Earn an A-Plus in Security appeared first on Security Intelligence.

Continue reading Unapplied Knowledge: Using Endpoint Intelligence to Earn an A-Plus in Security

Lessons Learned From the WannaCry Ransomware Attack and Many Others That Preceded It

The best strategy to defend against the WannaCry ransomware attack and similar events is to adopt tools to prevent them from occurring in the first place.

The post Lessons Learned From the WannaCry Ransomware Attack and Many Others That Preceded It appeared first on Security Intelligence.

Continue reading Lessons Learned From the WannaCry Ransomware Attack and Many Others That Preceded It

Vulnerability Management in the Age of Analytics

An effective vulnerability management strategy requires and continuous visibility into endpoint activity and real-time control over devices in a network.

The post Vulnerability Management in the Age of Analytics appeared first on Security Intelligence.

Continue reading Vulnerability Management in the Age of Analytics