How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4

Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework.

The post How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4 appeared first on Security Intelligence.

Continue reading How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3

An attacker who gains access won’t necessarily walk away with an organization’s proprietary data. Here’s how a cyberattack framework can help you subvert an attacker already in a network.

The post How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3 appeared first on Security Intelligence.

Continue reading How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2

In the external reconnaissance and launch attack phases of the X-Force IRIS cyberattack preparation framework, threat actors look for vulnerabilities and tailor their attacks to exploit them.

The post How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2 appeared first on Security Intelligence.

Continue reading How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2

How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1

The IBM X-Force IRIS cyberattack preparation and execution frameworks aim to help security teams predict threat actors’ motives and tactics and communicate security intelligence more clearly.

The post How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1 appeared first on Security Intelligence.

Continue reading How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1

Best Practices for Designing a Security Operations Center

Designing a security operations center (SOC) is not as simple as setting and forgetting an SIEM solution. Security leaders must consider human factors, business needs, budgetary constraints and more.

The post Best Practices for Designing a Security Operations Center appeared first on Security Intelligence.

Continue reading Best Practices for Designing a Security Operations Center

The Cherry on Top: Add Value to Existing Risk Management Activities With Open Source Tools

Organizations with established risk management processes can drive efficiency and improve their overall risk posture by leveraging open source tools.

The post The Cherry on Top: Add Value to Existing Risk Management Activities With Open Source Tools appeared first on Security Intelligence.

Continue reading The Cherry on Top: Add Value to Existing Risk Management Activities With Open Source Tools

2018 IBM X Force Report: Shellshock Fades, Gozi Rises and Insider Threats Soar

The latest IBM X-Force report highlighted threats stemming from misconfigured cloud servers and inadvertent insider negligence and examined malware trends from 2017 that could continue into 2018.

The post 2018 IBM X Force Report: Shellshock Fades, Gozi Rises and Insider Threats Soar appeared first on Security Intelligence.

Continue reading 2018 IBM X Force Report: Shellshock Fades, Gozi Rises and Insider Threats Soar

Relieving Alert Fatigue With Personally Tailored Threat Intelligence

By tailoring threat intelligence to the specific concerns of the analysts consuming it, organizations can reduce alert fatigue and achieve higher levels of security maturity.

The post Relieving Alert Fatigue With Personally Tailored Threat Intelligence appeared first on Security Intelligence.

Continue reading Relieving Alert Fatigue With Personally Tailored Threat Intelligence

Relieving Alert Fatigue With Personally Tailored Threat Intelligence

By tailoring threat intelligence to the specific concerns of the analysts consuming it, organizations can reduce alert fatigue and achieve higher levels of security maturity.

The post Relieving Alert Fatigue With Personally Tailored Threat Intelligence appeared first on Security Intelligence.

Continue reading Relieving Alert Fatigue With Personally Tailored Threat Intelligence

Know Your Security X’s and O’s: Your Cyberdefense Team Is Only as Good as Its Threat Intelligence

Just like a college basketball team needs to know its X’s and O’s to win the big game and cut down the nets, a security team needs threat intelligence to win the ongoing battle against cyberthreats.

The post Know Your Security X’s and O’s: Your Cyberdefense Team Is Only as Good as Its Threat Intelligence appeared first on Security Intelligence.

Continue reading Know Your Security X’s and O’s: Your Cyberdefense Team Is Only as Good as Its Threat Intelligence