With organizations increasingly moving to cloud environments, cloud security is more critical than ever. Cloud environments often hold large troves of valuable and sensitive data that can put organizations and…
Browsing CategorySecurity Testing
Stronger Together — Building Cyber Resilience
In January, the World Economic Forum (WEF) again included cyberattacks as one of the top 10 most likely and significant risks to society in 2020. Less than two months later,…
Stick the Landing: 6 Steps to Broaden Your Cyber Resilience Web
Cyber resilience emerged as a response to the evolving need for information security. Organizations recognized that attacks were a question of when, not if, and adapted security strategy to include…
Are Current Security Assurance Models Suitable for the Digital World?
With the constantly transforming cyber landscape, intruders are always finding new ways to exploit weaknesses in organizations’ systems and applications. As a result, cyber-related incidents have become one of the…
Ad Hoc or Managed Penetration Testing: Which One Is Best for You?
Penetration testing is no longer an extraordinary security engagement. Due to regulatory mandates, internal policies, business executive requests and the overall desire to avoid becoming the next breach victim, testing…
3 Lessons From the Incident Response Tabletops
Within the field of incident response, planning and testing are key elements of a good security posture. The importance of training and methods of developing tests both feature highly on…
Cyber Security Resolutions in New Year to boost Your Cybersecurity in 2020
Cyber Security Resolutions in New Year to boost Your Cybersecurity in 2020 The new year has arrived, and with glasses raised and timeless stories recounted, we can now look to…
Smarter Devices, Smarter Fraud: Overlooked Threats in IoT Security
X-Force Red, IBM Security’s team of hackers, is hired by a variety of companies to find and help fix vulnerabilities exposing their most important assets to potential attacks. One sector…
Industrial Control Systems Security: To Test or Not to Test?
The technologies behind industrial control systems (ICS) drive the core operational processes in industries such as manufacturing and critical infrastructure. Many organizations in these sectors offer essential services that communities…
How IBM X-Force IRIS Prepared for the Ukraine Election
You may not have been aware there was a presidential election in Ukraine last Sunday, but all eyes in the cybersecurity and intelligence communities were keenly focused on this event.…