TRusted Anonymous Data Exchange (TRADE) Threat Intelligence Sharing With Blockchain

A new threat intelligence sharing network allows companies to control both who has access to information and the quality of anonymous threat data they consume.

The post TRusted Anonymous Data Exchange (TRADE) Threat Intelligence Sharing With Blockchain appeared first on Security Intelligence.

Continue reading TRusted Anonymous Data Exchange (TRADE) Threat Intelligence Sharing With Blockchain

How to Defend With the Courses of Action Matrix and Indicator Lifecycle Management

The lifecycle management of indicators is an important element to support decisions and actions against attackers. This process informs the courses of action matrix to build a response plan.

The post How to Defend With the Courses of Action Matrix and Indicator Lifecycle Management appeared first on Security Intelligence.

Continue reading How to Defend With the Courses of Action Matrix and Indicator Lifecycle Management

5 Ways to Improve Collaboration Among Security Professionals

Security professionals are not sharing intelligence as effectively as threat actors. The community can build a safer digital future for everyone by adopting more collaborative strategies.

The post 5 Ways to Improve Collaboration Among Security Professionals appeared first on Security Intelligence.

Continue reading 5 Ways to Improve Collaboration Among Security Professionals

The State of Cybersecurity: A CISO and CTO Dish on AI, Emerging Threats, Crisis Leadership and More

Sridhar Muppidi, CTO of cloud security and IAM at IBM Security, and Shamla Naidoo, global CISO at IBM, took time to discuss topics ranging from AI and blockchain to threat sharing and collaboration.

The post The State of Cybersecurity: A CISO and CTO Dish on AI, Emerging Threats, Crisis Leadership and More appeared first on Security Intelligence.

Continue reading The State of Cybersecurity: A CISO and CTO Dish on AI, Emerging Threats, Crisis Leadership and More

How Open Source Intelligence Could Save Your Network

Open source intelligence enables analysts to identify threats and uncover details about attacker behavior to improve their decision-making around incident response.

The post How Open Source Intelligence Could Save Your Network appeared first on Security Intelligence.

Continue reading How Open Source Intelligence Could Save Your Network

How Can an ISAC Improve Cybersecurity and Resilience?

Sharing computer security information is now an established practice in IT. But pooling resources in an ISAC can provide greater insight, broader collaboration and improved overall cyber resiliency.

The post How Can an ISAC Improve Cybersecurity and Resilience? appeared first on Security Intelligence.

Continue reading How Can an ISAC Improve Cybersecurity and Resilience?

Goal! Spam Campaigns Capitalize on the World Cup Craze

IBM X-Force researchers observed several ongoing spam campaigns tied to the World Cup — many of which used the official branding of tournament sponsors to lure victims.

The post Goal! Spam Campaigns Capitalize on the World Cup Craze appeared first on Security Intelligence.

Continue reading Goal! Spam Campaigns Capitalize on the World Cup Craze

How to Transform Data Into Actionable Threat Intelligence

Threat intelligence should be translated into business-speak to help decision-makers understand the impact of potential threats and incorporate TI into their business strategies.

The post How to Transform Data Into Actionable Threat Intelligence appeared first on Security Intelligence.

Continue reading How to Transform Data Into Actionable Threat Intelligence

How to Choose the Right Malware Classification Scheme to Improve Incident Response

Analysts can improve and automate their incident response processes by adopting the right malware classification scheme according to specific threat management goals.

The post How to Choose the Right Malware Classification Scheme to Improve Incident Response appeared first on Security Intelligence.

Continue reading How to Choose the Right Malware Classification Scheme to Improve Incident Response

Previewing RSA 2018: Collaboration, Orchestration and Augmented Intelligence

Our team at is optimistic about the future, and we believe that small teams can do impossibly big things. IBM Security experts will explain how at RSA 2018 in San Francisco.

The post Previewing RSA 2018: Collaboration, Orchestration and Augmented Intelligence appeared first on Security Intelligence.

Continue reading Previewing RSA 2018: Collaboration, Orchestration and Augmented Intelligence