Tuesday, September 25, 2018
IBM Security

What Metrics Do You Need to Measure the Success of Your SOC?

Day-to-day security functions are typically maintained by a specialized team in a security operations center (SOC). Although the core goal of the SOC is to provide a safe environment for the business, its responsibilities often expand far beyond detecting,...
IBM Security

How Analytics Can Help You Better Understand Access Risks

Cloud, the Internet of Things (IoT), mobile and digital business initiatives have broadened the surface and increased the complexity of identity and access management (IAM) environments. With millions of entitlements to manage across thousands of users and hundreds of...
IBM Security

Following the Clues With DcyFS: A File System for Forensics

This article concludes our three-part series on Decoy File System (DcyFS) with a concrete example of how a cyber deception platform can also be a powerful tool for extracting forensic summaries. Using that data can expedite postmortem investigations, reveal...
IBM Security

Understanding California’s Consumer Privacy Act: The ‘American GDPR’

As enterprises around the world deal with legislative backlash following years of unfettered data collection, companies are confused about how to achieve compliance not only with the General Data Protection Regulation (GDPR), but also with California’s Consumer Privacy Act...
IBM Security

Customer Focus Drives Leadership in SIEM, Security Analytics

IBM Security is once again thrilled to be recognized as a Leader in the second publication of the “Forrester Wave on Security Analytics” report. Over the last decade, we’ve seen plenty of changes in the security information and event...
IBM Security

How Can Companies Defend Against Adversarial Machine Learning Attacks in the Age of AI?

The use of AI and machine learning in cybersecurity is on the rise. These technologies can deliver advanced insights that security teams can use to identify threats accurately and in a timely fashion. But these very same systems can...
IBM Security

Where Do We Stand With Digital Identity Trust? Top 5 Findings From the ISMG Survey

When a waiter asks if you want fries or a milkshake with your meal, you might think, “Why can’t I have both?” The same goes for the customers of any organization with digital channels for services and products, especially...
IBM Security

Ransomware 101: What Is Ransomware and How Can You Protect Your Business?

Your organization gets hit by ransomware. Immediately, a million questions come to mind: What is ransomware? What machines are infected? What is the root cause? What is the recovery plan? How do we prevent this from happening in the...
IBM Security

When It Comes to Cloud Data Protection, Defend Your Information Like a Guard Dog

These days, enterprises are increasingly running their business from the cloud. But the portion of your business that’s running in this environment presents numerous security challenges. When it comes to cloud data protection, it’s not just credit card numbers...
IBM Security

Why Your Security Policies Could Be Failing Your Business

After three decades working in IT, I’ve noticed persistent peculiarities in how people deal with security oversight. It doesn’t matter if it’s a small mom-and-pop shop or the largest of corporations — the same behavior exists. And it’s the...
IBM Security

How to Drive ROI and Improve Endpoint Security With a Managed Security Services Provider

If you’re an IT managed service provider (MSP), there’s a tremendous opportunity to help your clients save money by providing a high-value endpoint security services while you receive a high margin of return in exchange. More specifically, businesses today are...
IBM Security

How Do You Know if Your Privileged Accounts Are at Risk?

Privileged access management (PAM) is one of the biggest priorities for security teams, but it brings some difficult challenges. Privileged users — your IT administrators or business super users — hold the keys to the organization’s crown jewels, or...
IBM Security

The State of Automotive Industrial IoT: Are Auto Companies Secure?

When applied in industrial control system (ICS) environments, Internet of Things (IoT) technologies result in the creation of cyber-physical systems — systems that combine advanced manufacturing technologies with advanced computing technologies to create better outcomes. These systems promise vastly...
IBM Security

Know Your Enemy: The Art and Science of Cyberthreat Hunting

From Rome to Mexico City, as my IBM Security colleagues and I have traveled the world teaching cyberthreat hunting, we’ve found a multitude of differing opinions about who is and isn’t a target for cyberattacks. One attendee at a recent...
IBM Security

Reconciling Trust With Security: A Closer Look at Cyber Deception With DcyFS

Co-authored by Teryl Taylor and Marc Ph. Stoecklin. This article is the second in a three-part series that provides a technical overview of Decoy File System (DcyFS). This original research was recently showcased in a paper titled “Hidden in Plain...

Breach at US Retailer SHEIN Hits Over Six Million Users

Breach at US Retailer SHEIN Hits Over Six Million UsersUS fashion retailer SHEIN has admitted suffering a major breach affecting the personal information of over six million customers. The women’s clothing company revealed at the end of last week that...
The Register

Bug? Feature? Power users baffled as BitLocker update switch-off continues

Microsoft claims issue confined to older kit Three months on, users continue to report that Microsoft's BitLocker disk encryption technology turns itself off during security updates.…
ZDNet

UK issues first-ever GDPR notice in connection to Facebook data scandal

Canadian firm AggregateIQ, linked to the Facebook & Cambridge Analytica data scandal, is the first to be put on notice.
SecurityWeek

Symantec Completes Internal Accounting Investigation

Symantec announced on Monday that it has completed its internal accounting audit, and while some issues have been uncovered, only one customer transaction has an impact on financial statements. read more

Are Colleges Teaching Real-World Cyber Security Skills?

The cybersecurity skill shortage is a well-recognized industry challenge, but the problem isn’t that there are too few people rather that many of them lack suitable skills and experience. Cybersecurity is a fast-growing profession, and talented graduates are in...