With AI2, Machine Learning and Analysts Come Together to Impress, Part 2: The Algorithms

AI2 uses an “analyst-in-the-loop” system to improve itself and a “human-in-the-loop” system to create examples to be used in iterative training algorithms.

The post With AI2, Machine Learning and Analysts Come Together to Impress, Part 2: The Algorithms appeared first on Security Intelligence.

Continue reading With AI2, Machine Learning and Analysts Come Together to Impress, Part 2: The Algorithms

Rising Attack Rates and Massive Breaches Plague Government Organizations

IBM’s “2016 Cyber Security Intelligence Index” reported that the government sector is now the fourth most frequently targeted industry in the U.S.

The post Rising Attack Rates and Massive Breaches Plague Government Organizations appeared first on Security Intelligence.

Continue reading Rising Attack Rates and Massive Breaches Plague Government Organizations

Hello, You’ve Been Compromised: Upward Attack Trend Targeting VoIP Protocol SIP

According to IBM Managed Security Services data, cybercriminals most commonly target the SIP and SCCP protocols in VOIP spam attacks.

The post Hello, You’ve Been Compromised: Upward Attack Trend Targeting VoIP Protocol SIP appeared first on Security Intelligence.

Continue reading Hello, You’ve Been Compromised: Upward Attack Trend Targeting VoIP Protocol SIP

Cybersecurity Meets Gamification at CTF Competitions

CTF competitions offer a closed arena for IT amateurs and experts to build and exercise their cybersecurity skills — and have a little fun along the way.

The post Cybersecurity Meets Gamification at CTF Competitions appeared first on Security Intelligence.

Continue reading Cybersecurity Meets Gamification at CTF Competitions

TrickBot Redirection Attacks Launched in Canada

TrickBot has developed new attack methods specifically designed to target banks in Canada in addition to its established targets in the U.K. and Australia.

The post TrickBot Redirection Attacks Launched in Canada appeared first on Security Intelligence.

Continue reading TrickBot Redirection Attacks Launched in Canada

‘In Security’ Web Comic, Episode 003: To the Command Center

The Every App team visits the IBM X-Force Command Center to see what can be done about Pandapocalypse. Can the Cyber Range help improve their response?

The post ‘In Security’ Web Comic, Episode 003: To the Command Center appeared first on Security Intelligence.

Continue reading ‘In Security’ Web Comic, Episode 003: To the Command Center

A Year in Collaborative Defense With IBM Security App Exchange

Data from the IBM Security App Exchange’s first year offers valuable insights into download patterns and the direction of the cybersecurity market overall.

The post A Year in Collaborative Defense With IBM Security App Exchange appeared first on Security Intelligence.

Continue reading A Year in Collaborative Defense With IBM Security App Exchange

Three Ways Effective Cyber Resilience Helps You Stay Cool in Moments of Chaos

IBM’s new X-Force Command Centers, Cyber Range and IRIS team can help security teams establish an effective cyber resilience strategy.

The post Three Ways Effective Cyber Resilience Helps You Stay Cool in Moments of Chaos appeared first on Security Intelligence.

Continue reading Three Ways Effective Cyber Resilience Helps You Stay Cool in Moments of Chaos

IBM X-Force IRIS: Bringing a New Approach to Incident Response

IBM formed the X-Force IRIS team to collaborate with clients to design solutions for today’s most challenging cybersecurity issues and threats.

The post IBM X-Force IRIS: Bringing a New Approach to Incident Response appeared first on Security Intelligence.

Continue reading IBM X-Force IRIS: Bringing a New Approach to Incident Response

Crisis Leadership: The Missing Link in Cyberattack Defense

C-suite executives often lack the experience and training required to establish and lead a successful cyberattack defense program.

The post Crisis Leadership: The Missing Link in Cyberattack Defense appeared first on Security Intelligence.

Continue reading Crisis Leadership: The Missing Link in Cyberattack Defense