Consent Management: Picking the Right CIAM Strategy

Practically everything consumers do online — shopping, paying bills and signing up for new services — requires some level of personal data sharing or changing privacy settings. Consumers need to feel that your organization’s digital experiences are worth trusting and that their data will be used for only its intended purpose and kept safe. This […]

The post Consent Management: Picking the Right CIAM Strategy appeared first on Security Intelligence.

Continue reading Consent Management: Picking the Right CIAM Strategy

5 Cloud Security Must-Haves in 2021

Organizations undertaking the move to the cloud face a blizzard of sometimes confusing buzzwords. There’s hybrid cloud, multicloud, digital transformation, microservices and so much more. While these terms can be confusing, the key element to keep in mind is that cloud data security should be an inherent part of business-level strategy and discussion for any […]

The post 5 Cloud Security Must-Haves in 2021 appeared first on Security Intelligence.

Continue reading 5 Cloud Security Must-Haves in 2021

Health Care Cybersecurity: Costly Data Breaches, Ensuring PII Security and Beyond

As hospitals get smarter, threat actors have more routes inside. IBM’s recent research on the health care industry shows how smart tools, which could be very valuable for today’s medical facilities, also need healing of their own. What should hospital IT security teams look out for? Our overview of the state of cybersecurity in the health […]

The post Health Care Cybersecurity: Costly Data Breaches, Ensuring PII Security and Beyond appeared first on Security Intelligence.

Continue reading Health Care Cybersecurity: Costly Data Breaches, Ensuring PII Security and Beyond

Dridex Campaign Propelled by Cutwail Botnet and Poisonous PowerShell Scripts

IBM X-Force threat intelligence has been observing a rise in Dridex-related network attacks that are being driven by the Cutwail botnet. Dridex is delivered as a second-stage infector after an initial document or spreadsheet arrives via email with booby-trapped macros. Recipients who activate the macros unknowingly launch malicious PowerShell scripts that will download additional malware. […]

The post Dridex Campaign Propelled by Cutwail Botnet and Poisonous PowerShell Scripts appeared first on Security Intelligence.

Continue reading Dridex Campaign Propelled by Cutwail Botnet and Poisonous PowerShell Scripts

Top 10 Cybersecurity Vulnerabilities of 2020

What cybersecurity vulnerabilities new and old should organizations look out for this year? Let IBM X-Force be your guide to today’s top cybersecurity threats with this detailed report. First, scanning for and exploiting vulnerabilities emerged as the top infection vector of 2020, according to the 2021 X-Force Threat Intelligence Index. In other words, attackers are […]

The post Top 10 Cybersecurity Vulnerabilities of 2020 appeared first on Security Intelligence.

Continue reading Top 10 Cybersecurity Vulnerabilities of 2020

Cloud Native Tools Series Part 2: Understand Your Responsibilities

As I mentioned in my first blog: traditional security just doesn’t work in the cloud. Businesses dependent on the cloud can make up for this by choosing native cloud security tools. But, they can’t do so unless they understand what aspects of cloud security they’re responsible for. The AWS Shared Security Model as a Guide Luckily, […]

The post Cloud Native Tools Series Part 2: Understand Your Responsibilities appeared first on Security Intelligence.

Continue reading Cloud Native Tools Series Part 2: Understand Your Responsibilities

‘Clear and Present Danger’: Why Cybersecurity Risk Management Needs to Keep Evolving

The phrase ‘future-proof’ is seductive. We want to believe technology prepares us for the future. But with threat actors and developers in an arms race to breach and protect, cybersecurity risk — and cybersecurity risk management — are always changing. As a recent report by World Economic Forum shows, businesses and other entities should know […]

The post ‘Clear and Present Danger’: Why Cybersecurity Risk Management Needs to Keep Evolving appeared first on Security Intelligence.

Continue reading ‘Clear and Present Danger’: Why Cybersecurity Risk Management Needs to Keep Evolving

Security Automation: The Future of Enterprise Defense

When it comes to giving cyber security experts the tools they need to take action, automation and machine learning (ML) can make a big difference. Many companies are working with high volumes of data, and types and variants of attack are always growing and changing. It can become too much for people to process in […]

The post Security Automation: The Future of Enterprise Defense appeared first on Security Intelligence.

Continue reading Security Automation: The Future of Enterprise Defense

2021 X-Force Threat Intelligence Index Reveals Peril From Linux Malware, Spoofed Brands and COVID-19 Targeting

From the front lines of incident response engagements to managed security services, IBM Security X-Force observes attack trends firsthand, yielding insights into the cyber threat landscape. Every year, X-Force collates billions of data points to assess cybersecurity threats to our customers.  This report — the X-Force Threat Intelligence Index 2021 — represents our latest edition of […]

The post 2021 X-Force Threat Intelligence Index Reveals Peril From Linux Malware, Spoofed Brands and COVID-19 Targeting appeared first on Security Intelligence.

Continue reading 2021 X-Force Threat Intelligence Index Reveals Peril From Linux Malware, Spoofed Brands and COVID-19 Targeting

Unleash the Power of MITRE for a More Mature SOC

The MITRE adversarial tactics, techniques and common knowledge (ATT&CK) framework brings pooled knowledge from across the cyber defense community, including revealing what threat actors are up to and how best you can defend against them. Let’s take a look at what MITRE offers and how this framework goes hand-in-hand with developing a security operations center (SOC) […]

The post Unleash the Power of MITRE for a More Mature SOC appeared first on Security Intelligence.

Continue reading Unleash the Power of MITRE for a More Mature SOC