Elevating Education on the Security and Resiliency Campus at Think 2018

Think 2018 offers attendees unique opportunity to interact with IBM experts, view hands-on demonstrations of cutting-edge technologies and tackle today’s top security issues.

The post Elevating Education on the Security and Resiliency Campus at Think 2018 appeared first on Security Intelligence.

Continue reading Elevating Education on the Security and Resiliency Campus at Think 2018

BGP Internet Routing: What Are the Threats?

The rate of BGP internet routing attacks has not increased significantly in the past two years. It is a considerable threat, however, because it puts the stability of the internet at risk.

The post BGP Internet Routing: What Are the Threats? appeared first on Security Intelligence.

Continue reading BGP Internet Routing: What Are the Threats?

New Year, New Threats: Five Security Predictions That Will Take Hold in 2018

The IBM Security X-Force team offered some security predictions for new trends in the technology landscape and threats that are poised to emerge in 2018.

The post New Year, New Threats: Five Security Predictions That Will Take Hold in 2018 appeared first on Security Intelligence.

Continue reading New Year, New Threats: Five Security Predictions That Will Take Hold in 2018

Threat Hunters Hansel and Gretel Keep the Forest Safe

Thanks to their harrowing experience with the Evil Witch, Hansel and Gretel went on to become expert threat hunters to protect the children of the forest.

The post Threat Hunters Hansel and Gretel Keep the Forest Safe appeared first on Security Intelligence.

Continue reading Threat Hunters Hansel and Gretel Keep the Forest Safe

Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition

At IRISSCON 2017, 48 contestants across 12 teams battled it out in a free-for-all CTF competition to test their hacking, defending and forensics skills.

The post Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition appeared first on Security Intelligence.

Continue reading Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition

Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition

At IRISSCON 2017, 48 contestants across 12 teams battled it out in a free-for-all CTF competition to test their hacking, defending and forensics skills.

The post Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition appeared first on Security Intelligence.

Continue reading Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition

The ‘Cracken’ in Action: A Password Cracking Adventure

To maximize the horsepower of its password cracking system, the IBM X-Force team built its own hardware to aid in penetration testing efforts.

The post The ‘Cracken’ in Action: A Password Cracking Adventure appeared first on Security Intelligence.

Continue reading The ‘Cracken’ in Action: A Password Cracking Adventure

Cybersecurity Tips to Help Retailers and Consumers Stay Secure During the Holiday Season

Consumers and retailers should implement these basic cybersecurity tips year-round to stay secure during the busy holiday shopping season.

The post Cybersecurity Tips to Help Retailers and Consumers Stay Secure During the Holiday Season appeared first on Security Intelligence.

Continue reading Cybersecurity Tips to Help Retailers and Consumers Stay Secure During the Holiday Season

The Ugly Duckling’s Security Testing Transformation

Some are wary of the Ugly Duckling due to his advanced hacking abilities, but when it comes to security testing, he’s really one of the good guys.

The post The Ugly Duckling’s Security Testing Transformation appeared first on Security Intelligence.

Continue reading The Ugly Duckling’s Security Testing Transformation

How Not to Store Passwords: SHA-1 Fails Again

Symmetric key encryption, password hashing and SHA-1 are all ineffective ways to store passwords during the software development stage.

The post How Not to Store Passwords: SHA-1 Fails Again appeared first on Security Intelligence.

Continue reading How Not to Store Passwords: SHA-1 Fails Again