What’s In a (Threat Intelligence) Name?

A lot of things in the threat intelligence world have multiple names, and these aliases often complicate the process of researching and dealing with security threats.

The post What’s In a (Threat Intelligence) Name? appeared first on Security Intelligence.

Continue reading What’s In a (Threat Intelligence) Name?

How Mike Barcomb’s Military Mindset Enhances Incident Response

IBMer Mike Barcomb draws upon his experience in the U.S. Army Reserve to lead a team of incident response experts through careful planning, regular rehearsals and quick decision-making.

The post How Mike Barcomb’s Military Mindset Enhances Incident Response appeared first on Security Intelligence.

Continue reading How Mike Barcomb’s Military Mindset Enhances Incident Response

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4

Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework.

The post How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4 appeared first on Security Intelligence.

Continue reading How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3

An attacker who gains access won’t necessarily walk away with an organization’s proprietary data. Here’s how a cyberattack framework can help you subvert an attacker already in a network.

The post How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3 appeared first on Security Intelligence.

Continue reading How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2

In the external reconnaissance and launch attack phases of the X-Force IRIS cyberattack preparation framework, threat actors look for vulnerabilities and tailor their attacks to exploit them.

The post How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2 appeared first on Security Intelligence.

Continue reading How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2

How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1

The IBM X-Force IRIS cyberattack preparation and execution frameworks aim to help security teams predict threat actors’ motives and tactics and communicate security intelligence more clearly.

The post How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1 appeared first on Security Intelligence.

Continue reading How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1

Understanding SIEM Technology: How to Add Value to Your Security Intelligence Implementation

As the threat landscape expands — and IT skills grow increasingly scarce — many security leaders don’t know how to get the most out of their security information and event management (SIEM) solution.

The post Understanding SIEM Technology: How to Add Value to Your Security Intelligence Implementation appeared first on Security Intelligence.

Continue reading Understanding SIEM Technology: How to Add Value to Your Security Intelligence Implementation

The Cybercrime Landscape Is Evolving — Will Your Mobile Threat Defense Strategy Keep Up?

As the workforce embraces mobility to increase productivity, organizations must adopt a more innovative, dynamic approach to mobile threat defense.

The post The Cybercrime Landscape Is Evolving — Will Your Mobile Threat Defense Strategy Keep Up? appeared first on Security Intelligence.

Continue reading The Cybercrime Landscape Is Evolving — Will Your Mobile Threat Defense Strategy Keep Up?

Preempt raises $17.5 million in Series B for enterprise threat management

San Francisco enterprise threat management company Preempt Security earned $17.5 million in its Series B funding round, the company announced on Wednesday. Preempt says that it uses information about identity, behavior and risk within a company to proactively catch insider threats and prevent breaches. Management of such threats is a constant struggle for enterprises, as they need to ensure that employees don’t willingly or inadvertently expose sensitive information. CEO Ajit Sancheti told CyberScoop that Preempt can anticipate and stop both malicious insiders and unwittingly compromised users by monitoring their privileges and behavior on the network. Preempt can force users to validate their identity via multi-factor authentication if it senses something is awry. “Internal threats are difficult to detect since the behavior of the malicious users or the compromised accounts are difficult to differentiate from legitimate users. Since Preempt can force the verification of identity of a user in real time […]

The post Preempt raises $17.5 million in Series B for enterprise threat management appeared first on Cyberscoop.

Continue reading Preempt raises $17.5 million in Series B for enterprise threat management

How to Prioritize Security Vulnerabilities in SecDevOps

What’s the first step toward prioritizing security vulnerabilities? Know which open source components developers use in their code and monitor them for alerts using SAST tools.

The post How to Prioritize Security Vulnerabilities in SecDevOps appeared first on Security Intelligence.

Continue reading How to Prioritize Security Vulnerabilities in SecDevOps