How the Financial Services Industry Is Preparing to Avoid and Respond to Systemic Cyberattacks

Financial services industry leaders visited the IBM X-Force Command Cyber Range for a war game exercise designed to battle-test their response to a systemic cyberattack.

The post How the Financial Services Industry Is Preparing to Avoid and Respond to Systemic Cyberattacks appeared first on Security Intelligence.

Continue reading How the Financial Services Industry Is Preparing to Avoid and Respond to Systemic Cyberattacks

Why User Behavior Analytics Is an Application, Not a Cybersecurity Platform

User behavior analytics (UBA) is a good application, but it isn’t a replacement for SIEM. UBA is more accurately described as a cybersecurity application that can be added on top of an SIEM tool.

The post Why User Behavior Analytics Is an Application, Not a Cybersecurity Platform appeared first on Security Intelligence.

Continue reading Why User Behavior Analytics Is an Application, Not a Cybersecurity Platform

IBM Security Named a Leader in IDC Incident Response MarketScape Report

This year, IDC recognized IBM X-Force Incident Response and Intelligence Services (IRIS) for effectively streamlining incident response (IR) for customers around the globe.

The post IBM Security Named a Leader in IDC Incident Response MarketScape Report appeared first on Security Intelligence.

Continue reading IBM Security Named a Leader in IDC Incident Response MarketScape Report

Does Your SOC Have a Security Playbook?

By creating, regularly reviewing and maintaining a security playbook, SOC leaders can position analysts to execute incident response processes more quickly and effectively.

The post Does Your SOC Have a Security Playbook? appeared first on Security Intelligence.

Continue reading Does Your SOC Have a Security Playbook?

What’s In a (Threat Intelligence) Name?

A lot of things in the threat intelligence world have multiple names, and these aliases often complicate the process of researching and dealing with security threats.

The post What’s In a (Threat Intelligence) Name? appeared first on Security Intelligence.

Continue reading What’s In a (Threat Intelligence) Name?

How to Achieve Ransomware Recovery — Without Paying Ransom

Ransomware recovery can be costly for companies with no defense strategy in place. Here’s what your organization can do to protect itself from these ever-evolving threats.

The post How to Achieve Ransomware Recovery — Without Paying Ransom appeared first on Security Intelligence.

Continue reading How to Achieve Ransomware Recovery — Without Paying Ransom

New Data Privacy Regulation Deadline Spawns Phishing Attack Outbreak

The use of trendy stories or pressing compliance deadlines to launch attacks is nothing new to cyber criminals. While phishing attacks cause pain for consumers, the implications on the corporate side are much larger. Find out how cyber criminals are t… Continue reading New Data Privacy Regulation Deadline Spawns Phishing Attack Outbreak

How to Choose the Right Malware Classification Scheme to Improve Incident Response

Analysts can improve and automate their incident response processes by adopting the right malware classification scheme according to specific threat management goals.

The post How to Choose the Right Malware Classification Scheme to Improve Incident Response appeared first on Security Intelligence.

Continue reading How to Choose the Right Malware Classification Scheme to Improve Incident Response

Not Enough Hours in the Day? Respond Faster With Automated, Intelligent Security Analytics

An automated security analytics platform can help understaffed security teams sift through threat data more efficiently and focus on more critical tasks.

The post Not Enough Hours in the Day? Respond Faster With Automated, Intelligent Security Analytics appeared first on Security Intelligence.

Continue reading Not Enough Hours in the Day? Respond Faster With Automated, Intelligent Security Analytics

AI is key to speeding up threat detection and response

Time is the most important factor in detecting network breaches and, consequently, in containing cyber incidents and mitigating the cost of a breach. “Security event investigations can last hours, and a full analysis of an advanced threat can take days, weeks or even months. Even large security operations center (SOC) teams with more than 10 skilled analysts find it difficult to detect, confirm, remediate, and verify security incidents in minutes and hours,” says Chris Morales, … More Continue reading AI is key to speeding up threat detection and response