How Dimitry Snezhkov Balances the Yin and Yang of Penetration Testing

Dimitry Snezhkov didn't touch a computer until he was 18. Now he spends his days penetration testing to uncover security gaps and his nights meditating on the balance of life. 

November 1, 2018 | By Security Intelligence Staff

Why Limor Golan Works Hard to Make Security Operations Easier

Limor Golan is a self-described hyperactive developer who works best under stress. Trusteer was so impressed they created a role specifically for her to improve security operations through automation.

October 18, 2018 | By Security Intelligence Staff

30,000 Android Users Infected With Banking Malware From 29 Bogus Apps

Nearly 30,000 Android users accidentally downloaded banking malware after being tricked by personalized phishing forms based on the apps they use.

Nov 1, 2018

How Security Consultant Ben Goodrich Uses Physics to Navigate the State of Constant Change

Just three years ago Ben Goodrich graduated with a degree in physics. Today he's a security consultant working with the world's biggest companies to provide an injection of cybersecurity expertise.

October 25, 2018 | By Security Intelligence Staff

Simplify Your Security With an Open Cloud-Based Platform

Today, we're announcing IBM Security Connect, an open, cloud-based platform that is capable of analyzing federated security data across unconnected tools and environments.

October 16, 2018 | By Marc van Zadelhoff

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 1

The IBM X-Force IRIS cyberattack preparation and execution frameworks aim to help security teams predict threat actors' motives and tactics and communicate security intelligence more clearly.

July 18, 2018 | By Alexandrea Berninger

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2

In the external reconnaissance and launch attack phases of the X-Force IRIS cyberattack preparation framework, threat actors look for vulnerabilities and tailor their attacks to exploit them.

July 25, 2018 | By Alexandrea Berninger

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3

An attacker who gains access won't necessarily walk away with an organization's proprietary data. Here's how a cyberattack framework can help you subvert an attacker already in a network.

August 1, 2018 | By Alexandrea Berninger

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4

Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework.

August 9, 2018 | By Alexandrea Berninger