3 Lessons That Are Informing the Next Generation of the Cyber Range

With the success and lessons learned from our X-Force Command Cyber Range, IBM is excited to launch its new mobile command center, the X-Force Command Cyber Tactical Operations Center (C-TOC).

The post 3 Lessons That Are Informing the Next Generation of the Cyber Range appeared first on Security Intelligence.

Continue reading 3 Lessons That Are Informing the Next Generation of the Cyber Range

How to Outsmart the Smart City

Researchers from Threatcare and IBM X-Force Red joined forces to test several smart city devices, with the goal of investigating “supervillain-level” attacks. Here’s what the teams found.

The post How to Outsmart the Smart City appeared first on Security Intelligence.

Continue reading How to Outsmart the Smart City

How to Get the Most Out of DEF CON and Black Hat 2018

The IBM X-Force Red team is well-represented at DEF CON and Black Hat 2018, hosting sessions and panels about smart city security, vulnerability management and more.

The post How to Get the Most Out of DEF CON and Black Hat 2018 appeared first on Security Intelligence.

Continue reading How to Get the Most Out of DEF CON and Black Hat 2018

Calculating the Cost of a Data Breach in 2018, the Age of AI and the IoT

The 2018 Cost of a Data Breach Study from Ponemon Institute reveals that the total cost, per-capita cost and average size of a data breach have all increased year over year.

The post Calculating the Cost of a Data Breach in 2018, the Age of AI and the IoT appeared first on Security Intelligence.

Continue reading Calculating the Cost of a Data Breach in 2018, the Age of AI and the IoT

Space Rogue: A Security Rebel Turned Pen Tester

Two decades ago, Cris Thomas testified before Congress about various cybersecurity issues he uncovered as a white hat hacker. Today, he works as a penetration testing specialist for IBM X-Force Red.

The post Space Rogue: A Security Rebel Turned Pen Tester appeared first on Security Intelligence.

Continue reading Space Rogue: A Security Rebel Turned Pen Tester

Introducing IBM X-Force Threat Management: A Smarter Security Solution to Manage the 360-Degree Threat Life Cycle

With IBM X-Force Threat Management, IBM Security experts collaborate with clients on a prescriptive journey toward improved threat management maturity.

The post Introducing IBM X-Force Threat Management: A Smarter Security Solution to Manage the 360-Degree Threat Life Cycle appeared first on Security Intelligence.

Continue reading Introducing IBM X-Force Threat Management: A Smarter Security Solution to Manage the 360-Degree Threat Life Cycle

Mobile Banking Trojans as Keen on Cryptocurrency as PC Malware

Cybercriminals are emulating PC malware to develop mobile banking Trojans that leverage malicious miners to steal cryptocurrency and deliver it to attacker-controlled wallets.

The post Mobile Banking Trojans as Keen on Cryptocurrency as PC Malware appeared first on Security Intelligence.

Continue reading Mobile Banking Trojans as Keen on Cryptocurrency as PC Malware

Why You Need Collaborative Defense in Depth

A collaborative defense strategy enables companies to unite siloed departments, integrate threat defense and extend security capabilities beyond the individual power of each tool.

The post Why You Need Collaborative Defense in Depth appeared first on Security Intelligence.

Continue reading Why You Need Collaborative Defense in Depth

Why You Need Collaborative Defense in Depth

A collaborative defense strategy enables companies to unite siloed departments, integrate threat defense and extend security capabilities beyond the individual power of each tool.

The post Why You Need Collaborative Defense in Depth appeared first on Security Intelligence.

Continue reading Why You Need Collaborative Defense in Depth

No Rest for the Weary: Applying Security Lessons From 2017 in the New Year

How can it be that we are already through January and moving into February of the new year? I don’t know about you, but I still have a long list of resolutions to accomplish and I need to focus on what I can realistically get done in 2018. This makes me think about how everyone […]

The post No Rest for the Weary: Applying Security Lessons From 2017 in the New Year appeared first on Security Intelligence.

Continue reading No Rest for the Weary: Applying Security Lessons From 2017 in the New Year