Taking apart a double zero-day sample discovered in joint hunt with ESET

In late March 2018, I analyzed an interesting PDF sample found by ESET senior malware researcher Anton Cherpanov. The sample was initially reported to Microsoft as a potential exploit for an unknown Windows kernel vulnerability. During my investigation… Continue reading Taking apart a double zero-day sample discovered in joint hunt with ESET

Why Network Visibility Is Critical for Today’s Compliance Mandates

Without network visibility, organizations run the risk of mishandling customers’ personal data and running afoul of new compliance mandates.

The post Why Network Visibility Is Critical for Today’s Compliance Mandates appeared first on Security Intelligence.

Continue reading Why Network Visibility Is Critical for Today’s Compliance Mandates

Machine learning vs. social engineering

Machine learning is a key driver in the constant evolution of security technologies at Microsoft. Machine learning allows Microsoft 365 to scale next-gen protection capabilities and enhance cloud-based, real-time blocking of new and unknown threats. Ju… Continue reading Machine learning vs. social engineering

The Security Data Scientist Is the Icing on the Cake

Many organizations are hiring a security data scientist to support analysts and provide deep insights to the chief information security officer (CISO).

The post The Security Data Scientist Is the Icing on the Cake appeared first on Security Intelligence.

Continue reading The Security Data Scientist Is the Icing on the Cake

Can a Cognitive-Powered Security Intelligence Platform Bring Your SOC Up to Speed?

Without cognitive insights, a security intelligence platform does little to ease the pressure on short-staffed security operations center (SOC) teams to analyze massive volumes of threat data.

The post Can a Cognitive-Powered Security Intelligence Platform Bring Your SOC Up to Speed? appeared first on Security Intelligence.

Continue reading Can a Cognitive-Powered Security Intelligence Platform Bring Your SOC Up to Speed?

Achieving More Effective Security With Collaborative Defense in Depth

Collaborative defense connects an organization’s people, processes and technology to deliver improved security through open integrations, threat intelligence sharing and digital transformation.

The post Achieving More Effective Security With Collaborative Defense in Depth appeared first on Security Intelligence.

Continue reading Achieving More Effective Security With Collaborative Defense in Depth

IBM Resilient Delivers Robust Integrations Through Our Orchestration Ecosystem

Today we unveiled the next generation of incident response with the Resilient Incident Response Platform with Intelligent Orchestration.

The post IBM Resilient Delivers Robust Integrations Through Our Orchestration Ecosystem appeared first on Security Intelligence.

Continue reading IBM Resilient Delivers Robust Integrations Through Our Orchestration Ecosystem

IBM Resilient Launches Intelligent Orchestration: The Next Generation of Incident Response

Today, we are proud to announce the launch of Intelligent Orchestration with the next-generation of the Resilient Incident Response Platform (IRP).

The post IBM Resilient Launches Intelligent Orchestration: The Next Generation of Incident Response appeared first on Security Intelligence.

Continue reading IBM Resilient Launches Intelligent Orchestration: The Next Generation of Incident Response

The Future of Cognitive Security Is Now

Is cognitive security all hype, or can AI-powered tools help organizations defend their networks against evolving cyberthreats today?

The post The Future of Cognitive Security Is Now appeared first on Security Intelligence.

Continue reading The Future of Cognitive Security Is Now

Relieving Alert Fatigue With Personally Tailored Threat Intelligence

By tailoring threat intelligence to the specific concerns of the analysts consuming it, organizations can reduce alert fatigue and achieve higher levels of security maturity.

The post Relieving Alert Fatigue With Personally Tailored Threat Intelligence appeared first on Security Intelligence.

Continue reading Relieving Alert Fatigue With Personally Tailored Threat Intelligence