How Dimitry Snezhkov Balances the Yin and Yang of Penetration Testing
Dimitry Snezhkov didn't touch a computer until he was 18. Now he spends his days penetration testing to uncover security gaps and his nights meditating on the balance of life.
November 1, 2018 | By Security Intelligence Staff
Why Limor Golan Works Hard to Make Security Operations Easier
Limor Golan is a self-described hyperactive developer who works best under stress. Trusteer was so impressed they created a role specifically for her to improve security operations through automation.
October 18, 2018 | By Security Intelligence Staff
30,000 Android Users Infected With Banking Malware From 29 Bogus Apps
Nearly 30,000 Android users accidentally downloaded banking malware after being tricked by personalized phishing forms based on the apps they use.
Nov 1, 2018
How Security Consultant Ben Goodrich Uses Physics to Navigate the State of Constant Change
Just three years ago Ben Goodrich graduated with a degree in physics. Today he's a security consultant working with the world's biggest companies to provide an injection of cybersecurity expertise.
October 25, 2018 | By Security Intelligence Staff
Simplify Your Security With an Open Cloud-Based Platform
Today, we're announcing IBM Security Connect, an open, cloud-based platform that is capable of analyzing federated security data across unconnected tools and environments.
October 16, 2018 | By Marc van Zadelhoff
How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 1
The IBM X-Force IRIS cyberattack preparation and execution frameworks aim to help security teams predict threat actors' motives and tactics and communicate security intelligence more clearly.
July 18, 2018 | By Alexandrea Berninger
How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2
In the external reconnaissance and launch attack phases of the X-Force IRIS cyberattack preparation framework, threat actors look for vulnerabilities and tailor their attacks to exploit them.
July 25, 2018 | By Alexandrea Berninger
How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3
An attacker who gains access won't necessarily walk away with an organization's proprietary data. Here's how a cyberattack framework can help you subvert an attacker already in a network.
August 1, 2018 | By Alexandrea Berninger
How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4
Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework.
August 9, 2018 | By Alexandrea Berninger