Very little in life grabs our attention like a shiny new object. The gleam can be irresistible, the glitter mesmerizing. That’s how it is in cybersecurity, where the landscape is almost always dotted with alluringly novel hazards. Brand new threats, fresh twists on old threats — the shiny malicious objects just keep on coming, year in and year out. 201
Many CISOs tell us one of their most difficult challenges is identifying, hiring and retaining top security talent with the skills, experience and passion to protect their organizations’ valuable brand against the dynamic cyberthreat landscape. It’s for this reason CISOs often turn to managed security services providers as a strategy to partner a
Since we last reported on a version of the ELF Linux/Mirai malware containing cryptocurrency coin-mining tools in April, the IBM X-Force has noticed a steep increase in the volume of coin central processing unit (CPU) mining tools used in cyberattacks, specifically those targeting enterprise networks.
According to IBM Managed Security Services (MSS) data,
There is an increased focus on cybersecurity among governments and energy and utilities organizations worldwide, and for good reason. Attacks on critical infrastructure such as fuel, electricity and drinking water carry the potential for damage far beyond their economic impact. As demonstrated by incidents such as the notorious shutdown of several Iranian nu
The is the second article in a three-part series on how IBM Watson for Cyber Security can help analysts win the arms race against the increasingly sophisticated cybercrime landscape. Be sure to read part 1 for the full story.
Many large enterprises with significant investment in cybersecurity are excited at the prospect of cognitive security. But what abou
The definition of fintech, or financial technology, has grown in leaps and bounds thanks to all the disruption it has brought. Any services, aside from mainstream banking and financial tools, that aim to improve personal or commercial finance through innovation, education, banking, investment, payment, advisory or blockchain can be classified as subsets of
When it comes to taking chances and not letting an opportunity pass you by, Zac Brown Band said it best in the song, “As She’s Walking Away”:
And don’t be falling in love as she’s walking away When your heart won’t tell your mind to tell your mouth what it should say May have lost this battle, live to fight another day Don
Growing up in a small town, there wasn’t much to do. One magical day, I watched as a truck pulled up to the one restaurant in town and delivered a large crate onto the loading dock. Intrigued, I rode my bike over as the employees popped the top off a crate and revealed what was inside: a new arcade game called Missile Command.
Fast forward to several m
We are kicking off the new year by saying thank you to our spectacular clients all around the world that push us each year to reach for innovation in our Managed Security Services (MSS). For the third consecutive year, IBM is recognized as a Leader in the Gartner Magic Quadrant for Managed Security Services.
This is especially exciting given the well-receive
A government’s core role is to protect and enhance the lives of its citizens. It must deliver services to create and sustain a robust and efficient public infrastructure, ensure public safety, foster sustainable economic growth and build stronger communities. Those tasks bring many challenges, but the overriding requirement of security is common to the
For organizations in the Asia-Pacific region, information security has never been more important. Cyberattacks are disrupting businesses and impacting organizations across industries. As a result, businesses of all sizes are feeling the heat.
Boost Preparedness With Managed Security Services
Most organizations are looking to make the most of the discrete sec
Authored by Cathy Huang, Senior Research Manager, IDC Asia-Pacific.
Comparing MSS Offerings in Asia-Pacific
The recent “IDC MarketScape: 2016 Asia-Pacific Managed Security Services” report evaluated 17 prominent managed security services providers (MSSPs) in the region and identified six market leaders: IBM, NTT Com, CSC, BT, Symantec and Verizon
When the source code for the Mirai botnet was made public in late September, a top concern was that bad actors might modify the code to increase the number of Internet of Things (IoT) devices they can compromise. It seems these fears have been realized.
A few weeks ago, Reverse Engineering Blog disclosed a vulnerability in the Eir D1000 modem that could enab
VoIP Attacks by the Numbers
There are numerous protocols used in voice-over-IP (VoIP) communications. According to IBM Managed Security Services (MSS) data, the most targeted VoIP protocol is Session Initiation Protocol (SIP), which accounted for over 51 percent of the security event activity analyzed in the last 12 months.
SIP is one of the most commonly
There’s nothing inherently malicious about a webshell, which is a script that can be uploaded to a web server to enable remote administration of the machine. In the hands of an attacker, however, they are a serious cyberthreat. Advanced persistent threat (APT) groups often use webshells to breach organizations.
Webshell Attacks Surging
Earlier this yea
Announce
Share high-quality web security related articles with you:)
Tools