Tag: Security Services
-
Bringing threat intelligence and adversary insights to the forefront: X-Force Research Hub
Today defenders are dealing with both a threat landscape that’s constantly changing and attacks that have stood the test of time. …
-
Sign Language: How to Write Effective Security Services Contracts – CFH #29
There’s a lot that goes into the creation of a managed services contract before the client ever puts their John Hancock on the dotted line. …
-
Attacker exploits vulnerability in Active Directory Certificate Services to take control of domain
This post was made possible through the contributions of Joseph Spero and Thanassis Diogos. In June 2023, IBM Security X-Force responded to …
-
The Trickbot/Conti Crypters: Where Are They Now?
Despite Conti shutdown, operators remain active and collaborative in new factions In IBM Security X-Force, we have been following the …
-
A History of Ransomware and the Cybersecurity Ecosystem
The number and complexity of cybersecurity tools have grown at a dizzying pace in recent decades. As cyber threats like ransomware became …
-
Secure-by-Design: Which Comes First, Code or Security?
Without secure code, applications remain at risk of attack. But the buck must stop with technology …
-
Detecting Insider Threats: Leverage User Behavior Analytics
Employees often play an unwitting role in many security incidents, from accidental data breaches to intentional malicious attacks. …
-
Ransomware Renaissance 2023: The Definitive Guide to Stay Safer
Ransomware is experiencing a renaissance in 2023, with some cybersecurity firms reporting over 400 attacks in the month of March alone. And …
-
How I Got Started: Offensive Security
In the high-stakes world of cybersecurity, offensive security experts play a pivotal role in identifying and mitigating potential threats. …
-
Rationalizing Your Hybrid Cloud Security Tools
As cyber incidents rise and threat landscapes widen, more security tools have emerged to protect the hybrid cloud ecosystem. As a result, …
-
How I Got Started: SOC Analyst
The role of a Security Operations Center (SOC) analyst is crucial in maintaining an organization’s security posture. A SOC analyst wears …
-
What Comes After the Digital Transformation?
When Covid hit, companies had to accelerate their digital transformation process out of necessity. But now, almost three years after the …
●●●