The Cognitive Analyst and Artificial Intelligence

It’s natural for security professionals to be nervous, but Watson is designed to augment the role of the cognitive analyst, not replace it entirely.

The post The Cognitive Analyst and Artificial Intelligence appeared first on Security Intelligence.

Continue reading The Cognitive Analyst and Artificial Intelligence

Threat Intelligence in the Age of Cyber Warfare

In the age of cyber warfare, security analysts must determine which assets are most critical and prioritize their defense strategies accordingly.

The post Threat Intelligence in the Age of Cyber Warfare appeared first on Security Intelligence.

Continue reading Threat Intelligence in the Age of Cyber Warfare

The Competing Claims of Security Vendors Sow Customer Distrust

There is no such thing as a magic bullet for security. When security vendors push their products too hard, customers grow skeptical of the entire industry.

The post The Competing Claims of Security Vendors Sow Customer Distrust appeared first on Security Intelligence.

Continue reading The Competing Claims of Security Vendors Sow Customer Distrust

Know Your Apps: Explore the IBM Security App Exchange Ecosystem for Collaborative Defense

Security collaboration hits the next level with the IBM Security App Exchange, a marketplace for the security community to create and share apps.

The post Know Your Apps: Explore the IBM Security App Exchange Ecosystem for Collaborative Defense appeared first on Security Intelligence.

Continue reading Know Your Apps: Explore the IBM Security App Exchange Ecosystem for Collaborative Defense

Address Registry and File Activity Monitoring Requirements With the Snare Log Analysis App

The Snare Log Analysis App offers security analysts an extra pair of eyes to help them analyze SIEM logs and meet file activity monitoring requirements.

The post Address Registry and File Activity Monitoring Requirements With the Snare Log Analysis App appeared first on Security Intelligence.

Continue reading Address Registry and File Activity Monitoring Requirements With the Snare Log Analysis App

A Dream of Cognitive Security? How Watson Can Help Small and Midsized Businesses Save Money

Cognitive security solutions such as Watson can help businesses of all sizes save money and reduce the impact of a cyberattack.

The post A Dream of Cognitive Security? How Watson Can Help Small and Midsized Businesses Save Money appeared first on Security Intelligence.

Continue reading A Dream of Cognitive Security? How Watson Can Help Small and Midsized Businesses Save Money

Inside the National CCDC: Building Cybersecurity Skills for the Future

A Collegiate Cyber Defense Competition (CCDC) offers technology companies such as IBM an opportunity to network with and recruit aspiring IT analysts.

The post Inside the National CCDC: Building Cybersecurity Skills for the Future appeared first on Security Intelligence.

Continue reading Inside the National CCDC: Building Cybersecurity Skills for the Future

Qradar Advisor With Watson Makes Cybersecurity More Human

QRadar Advisor with Watson is not meant to replace humans in the SOC. Instead, it is designed to help analysts make better decisions more quickly.

The post Qradar Advisor With Watson Makes Cybersecurity More Human appeared first on Security Intelligence.

Continue reading Qradar Advisor With Watson Makes Cybersecurity More Human

Surfing the Tsunami of Threat Data With Cognitive Security

Nowadays, most organizations’ networks are under constant attack. Cognitive security is the key to locating IoCs within the tsunami of threat intelligence.

The post Surfing the Tsunami of Threat Data With Cognitive Security appeared first on Security Intelligence.

Continue reading Surfing the Tsunami of Threat Data With Cognitive Security