New Wiper Malware Used Against Ukranian Organizations

On February 24, 2022, ESET reported another destructive wiper detected at a Ukrainian government organization dubbed as IsaacWiper. This is the third sample of malware IBM Security X-Force has analyzed which has been reportedly targeting systems belonging to Ukrainian organizations.  IBM Security X-Force obtained a sample of the IsaacWiper malware and has provided the following […]

The post New Wiper Malware Used Against Ukranian Organizations appeared first on Security Intelligence.

Continue reading New Wiper Malware Used Against Ukranian Organizations

Topics & Questions – Paul’s Security Weekly #591

In our second segment, the Security Weekly hosts talks about some of our favorite hacker movies, influencers in the community, and what software and devices make appearances in our labs! Full Show NotesFollow us on Twitter: https://www.twitter.com/secu… Continue reading Topics & Questions – Paul’s Security Weekly #591

10 Cybersecurity Conference Trips You Should Make Time for This Year

Not sure where to distribute IT budgets for ideal returns? Here’s a roundup of the top 10 cybersecurity conference trips to make time for this year.

The post 10 Cybersecurity Conference Trips You Should Make Time for This Year appeared first on Security Intelligence.

Continue reading 10 Cybersecurity Conference Trips You Should Make Time for This Year

Elevating Education on the Security and Resiliency Campus at Think 2018

Think 2018 offers attendees unique opportunity to interact with IBM experts, view hands-on demonstrations of cutting-edge technologies and tackle today’s top security issues.

The post Elevating Education on the Security and Resiliency Campus at Think 2018 appeared first on Security Intelligence.

Continue reading Elevating Education on the Security and Resiliency Campus at Think 2018

The Gingerbread Man Cooks Up a GDPR Compliance Plan

The Gingerbread Man knew that May 25, 2018 was a big day: the day by which he had to achieve General Data Protection Regulation (GDPR) compliance. Organizations around the world — not just those in the European Union (EU) — needed to prepare. Was it getting hot in here, or was it just the pressure […]

The post The Gingerbread Man Cooks Up a GDPR Compliance Plan appeared first on Security Intelligence.

Continue reading The Gingerbread Man Cooks Up a GDPR Compliance Plan

Threat Hunters Hansel and Gretel Keep the Forest Safe

Thanks to their harrowing experience with the Evil Witch, Hansel and Gretel went on to become expert threat hunters to protect the children of the forest.

The post Threat Hunters Hansel and Gretel Keep the Forest Safe appeared first on Security Intelligence.

Continue reading Threat Hunters Hansel and Gretel Keep the Forest Safe

Slow and Steady Wins the Application Security Testing Race

The Tortoise and the Hare are challenged to develop an app, and the winner must consider both application security and functionality. Who will prevail?

The post Slow and Steady Wins the Application Security Testing Race appeared first on Security Intelligence.

Continue reading Slow and Steady Wins the Application Security Testing Race

The Grasshopper, the Ants and the Incident Response Plan

The passive Grasshopper should be more like the Ants, who use IBM Resilient to support their robust and comprehensive incident response plan.

The post The Grasshopper, the Ants and the Incident Response Plan appeared first on Security Intelligence.

Continue reading The Grasshopper, the Ants and the Incident Response Plan

The Emperor’s New Insider Threats

The Emperor was the greatest CISO in the land. His castle was as safe as could be, and there were no insider threats to be found — or so he thought.

The post The Emperor’s New Insider Threats appeared first on Security Intelligence.

Continue reading The Emperor’s New Insider Threats

Goldilocks Finds an Identity and Access Management Solution That Is Just Right

Goldilocks needs an identity and access management solution that provides not too much, not too little, but just the right level of access.

The post Goldilocks Finds an Identity and Access Management Solution That Is Just Right appeared first on Security Intelligence.

Continue reading Goldilocks Finds an Identity and Access Management Solution That Is Just Right