Over the course of two decades, I’ve seen Incident Response (IR) take on many forms. Cybercrime’s evolution has pulled the nature of IR along with it — shifts in cybercriminals’…
Browsing CategoryThreat Response
Extend Your Incident Response Program to DevOps With Security Automation
One of the biggest challenges facing security teams when it comes to incident response is complexity. The continual growth in volume and severity of cyberattacks has led to increased business…
3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020
During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global landscape. With the General Data Protection Regulation (GDPR) in full…
Recapping IBM Think 2019 and HIMSS19: The Shared Landscape of Global Security
With IBM Think 2019 and HIMSS19 in the books, it’s worth making time for a quick debrief. Which topics resonated the most with attendees? Where did conference themes and discussions…
It’s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare
When a client asked me to help build a cyberthreat intelligence program recently, I jumped at the opportunity to try something new and challenging. To begin, I set about looking…
How the Financial Services Industry Is Preparing to Avoid and Respond to Systemic Cyberattacks
Recently, leading up to a major U.S. holiday, cybercriminals targeted a number of payment and credit card companies. These companies received notice that if they didn’t each pay a ransom…
Why User Behavior Analytics Is an Application, Not a Cybersecurity Platform
Last year, a cybersecurity manager at a bank near me brought in a user behavior analytics (UBA) solution based on a vendor’s pitch that UBA was the next generation of…
IBM Security Named a Leader in IDC Incident Response MarketScape Report
This year, IDC recognized IBM X-Force Incident Response and Intelligence Services (IRIS) as a leader in its “IDC MarketScape: U.S. Incident Readiness, Response, and Resiliency Services 2018 Vendor Assessment.” The…
Does Your SOC Have a Security Playbook?
As the top coaches of any professional sports team would confirm, the best playbook is about much more than just the plays. In the same way that coaches use whiteboards…
What’s In a (Threat Intelligence) Name?
Almost since their inception, threat intelligence and network operations have faced the problem of having more than one name for a single thing. In other words, each thing often has…