CISO January 4, 2019 Your Security Strategy Is Only as Strong as Your Cyber Hygiene 3 min read - Without full network visibility and regular utilization of cyber hygiene best practices, your enterprise could face very real, but entirely preventable, security risks.
Threat Hunting December 21, 2018 More Than Just a Fad: Lessons Learned About Threat Hunting in 2018 3 min read - One cybersecurity capability that continues to prove it's here to stay is threat hunting, a proactive approach to discovering and mitigating threats.
Intelligence & Analytics December 12, 2018 3 Security Business Benefits From a 2018 Gartner Magic Quadrant SIEM Leader 3 min read - The main characteristics of a SIEM leader are centered around innovation in early threat detection, adaptation to customer environments and strong market presence.
Intelligence & Analytics December 12, 2018 Think Your Network Is Safe? If You Don’t Have Visibility Into Hardware Vulnerabilities, Think Again 2 min read - Even organizations that rigorously patch software flaws are exposed to a growing range of cyberthreats if they lack visibility into hardware vulnerabilities.
Intelligence & Analytics December 5, 2018 Advancing Security Operations Through the Power of a SIEM Platform 4 min read - Thanks to a wealth of new capabilities, security operations teams that leverage a cutting-edge SIEM platform are better armed to defend their organizations from advanced and insider threats.
Government December 5, 2018 How Can Government Security Teams Overcome Obstacles in IT Automation Deployment? 4 min read - IT automation is the future of security programs, but it's not simply plug-and-play. SOC leaders must implement this technology thoughtfully to unlock the full range of benefits.
Intelligence & Analytics December 4, 2018 Achieve Community Immunity With Security Data Integration 3 min read - With many enterprises unable to fill open roles for cybersecurity professionals, how can organizations boost collaboration to share security data and drive better outcomes?
Incident Response December 3, 2018 Fight Evolving Cybersecurity Threats With a One-Two-Three Punch 3 min read - Collaborative industry partnerships, a hardened attack surface and a well-practiced incident response plan are all critical in the fight against emerging cybersecurity threats.
Threat Intelligence November 30, 2018 5 Tips for Uncovering Hidden Cyberthreats with DNS Analytics 4 min read - By understanding the basics of DNS analytics, the common methods of attack and the tools available to security teams, you will be better prepared to protect your enterprise from hidden cyberthreats.
Advanced Threats November 28, 2018 Phish or Fox? A Penetration Testing Case Study From IBM X-Force Red 7 min read - The IBM X-Force Red team recently ran into trouble on a black-box penetration testing assignment. Here's how the testers overcame the obstacles to ultimately establish a solid adversarial operation.