View Part 1, Introduction to New Space, Part 2, Cybersecurity Threats in New Space, and Part 3, Securing the New Space, in this series. After the previous three parts of this…
Browsing CategoryNetwork
Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023
Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis…
Cybersecurity in the Next-Generation Space Age, Pt. 2: Cybersecurity Threats in the New Space
View Part 1 in this series, Introduction to New Space. The growth of the New Space economy, the innovation in technologies and the emergence of various private firms have contributed…
Contain Breaches and Gain Visibility With Microsegmentation
Organizations must grapple with challenges from various market forces. Digital transformation, cloud adoption, hybrid work environments and geopolitical and economic challenges all have a part to play. These forces have…
Beware of What Is Lurking in the Shadows of Your IT
This post was written with contributions from Joseph Lozowski. Comprehensive incident preparedness requires building out and testing response plans that consider the possibility that threats will bypass all security protections.…
Beyond Shadow IT: Expert Advice on How to Secure the Next Great Threat Surface
You’ve heard all about shadow IT, but there’s another shadow lurking on your systems: Internet of Things (IoT) devices. These smart devices are the IoT in shadow IoT, and they…
X-Force 2022 Insights: An Expanding OT Threat Landscape
This post was written with contributions from Dave McMillen. So far 2022 has seen international cyber security agencies issuing multiple alerts about malicious Russian cyber operations and potential attacks on…
Black Basta Besting Your Network?
This post was written with contributions from Chris Caridi and Kat Weinberger. IBM Security X-Force has been tracking the activity of Black Basta, a new ransomware group that first appeared…
Remote Work Makes it More Important Than Ever to Trust Zero Trust
The remote work era makes the zero trust model critical for most businesses. The time has come to use it. But first, let’s understand what it really is and why…
Where Everything Old is New Again: Operational Technology and Ghost of Malware Past
This post was written with contributions from IBM Security’s Sameer Koranne and Elias Andre Carabaguiaz Gonzalez. Operational technology (OT) — the networks that control industrial control system processes — face…