HackDig : Dig high-quality web security articles for hacker

Incident Response and Threat Intelligence: A Potent One-Two Punch to Fight Cybercrime

Cybercriminals and their tactics are becoming increasingly sophisticated. Given the rash of widespread, devastating attacks thus far in 2017, this trend shows no signs of slowing down. It’s no longer enough to simply implement incident response solutions. Today’s threats require a dedicated team of security experts to maximize these tools with
Publish At:2017-08-17 19:00 | Read:99 | Comments:0 | Tags:Incident Response Security Services Threat Intelligence Adva

Testing Top Leadership’s Muscle Memory With Data Breach Simulations

How would your organization’s leadership fare in its response to a full-on data breach? Regular and ongoing training can improve top leaders’ ability to respond to a cybersecurity breach and avoid doing additional damage to the reputation of the company as they deal with the repercussions. Organizations simply cannot afford to be lax about their
Publish At:2017-08-14 16:55 | Read:251 | Comments:0 | Tags:CISO Incident Response C-Suite Data Breach Executives IBM X-

Why Red on Blue Is a Crucial Component of Cyber Skills and Incident Response Training

More and more companies are looking to cyber exercises and capture the flag events to improve their incident response effectiveness, upskill staff and tackle the cybersecurity talent gap. A red on blue experience provides a safe sandbox environment for participating companies to stress test their business processes and challenge their capabilities in respon
Publish At:2017-08-03 06:55 | Read:122 | Comments:0 | Tags:Incident Response Cybersecurity Jobs Cybersecurity Training

Make Attorney-Client Privilege Part of Your Incident Response Strategy

According to Forrester, business and technology leaders often dismiss lawyers as obstacles to productivity. Many security teams fail to fully engage legal with incident response planning because: Lawyers are often seen as risk-averse, disengaged advisors. It’s difficult to know whether you’re talking to the right lawyer. There is a widespread b
Publish At:2017-08-01 18:05 | Read:203 | Comments:0 | Tags:Incident Response Risk Management Incident Response (IR) reg

Accelerate Response With Orchestration

Organizations today are battling three compounding challenges: complex cyberattacks that shift as they unfold, complicated technology environments and a fast-growing skills gap. As a result, technologies and processes that enable a dynamic, fast and orchestrated response are becoming vital. IBM Resilient has many enterprise deployments around the world spa
Publish At:2017-07-28 03:30 | Read:174 | Comments:0 | Tags:Incident Response IBM IBM Security Incident Response (IR) Re

Spot (and Remedy) the Rotten Apple Before It Spoils the SIEM Barrel

We all have heard the proverb: One rotten apple can spoil the whole barrel. This also applies to many practical scenarios in our day-to-day life, like finding a stinky sock in a pile of fresh laundry. Similarly, in a security operations center (SOC), one of the tasks security analysts spends most of their time on is identifying and detecting the actual threa
Publish At:2017-07-05 12:40 | Read:151 | Comments:0 | Tags:Incident Response Security Intelligence & Analytics Collabor

Game Over: Improving Your Cyber Analyst Workflow Through Gamification

Gamification — the process of applying game principles to real-life scenarios — is everywhere, from U.S. army recruitment to immersive cybersecurity training. Employee satisfaction and motivation can be fickle. In a job that requires both repetition and razor-sharp focus to pinpoint anomalies, it can be difficult to maintain an edge. This can lead to burnout
Publish At:2017-06-24 00:25 | Read:337 | Comments:0 | Tags:Incident Response Security Intelligence & Analytics IBM QRad

Know the Odds: The Cost of a Data Breach in 2017

We’ve all heard that when it comes to experiencing a data breach, the question is not if it will happen, but when. You may be wondering about the actual odds of it happening to your organization. Think about it this way: The chances of being struck by lightning this year are 1 in 960,000. When it comes to experiencing a data breach, according to the Po
Publish At:2017-06-20 22:45 | Read:525 | Comments:0 | Tags:Data Protection Incident Response Security Services Cost of

The Power of the Security Immune System

The most common cyberattacks tend to follow the same pattern: An employee receives a fraudulent email and unwittingly exploits a vulnerability upon opening a malicious attachment, exposing sensitive data. Of course, there are countless variations — an unknown vulnerability, encrypted or exfiltrated data, a malware-laden hyperlink — and each one could result
Publish At:2017-06-17 02:40 | Read:431 | Comments:0 | Tags:Data Protection Incident Response Security Intelligence & An

Using Network Insights to Stay One Step Ahead of Emerging Threats

While the world breathes a sigh of collective relief with the discovery of a kill switch that slowed down the WannaCry worm, significant risk remains. The website that activated the kill switch has come under attack, meaning that a new version of WannaCry without the weakness could easily be released. We need to remain vigilant. WannaCry has demonstrated its
Publish At:2017-06-07 21:40 | Read:368 | Comments:0 | Tags:Incident Response Network Risk Management Incident Response

QakBot Banking Trojan Causes Massive Active Directory Lockouts

IBM X-Force Research recently observed a wave of malware-induced Active Directory (AD) lockouts across several incident response engagements. The lockouts caused hundreds to thousands of AD users to get locked out of their company’s domain in rapid succession, leaving employees of the impacted organizations unable to access their endpoints, company ser
Publish At:2017-06-03 00:15 | Read:753 | Comments:0 | Tags:Advanced Threats Incident Response Threat Intelligence Banki

Security in Dog Years, Malware Analysis in Minutes

A few weeks ago, the security community had its security blanket ripped firmly away as the WannaCry ransomware ripped through hospitals, rail systems, telecommunication companies and more as it made its way around the globe. While the dust settles and researchers figure out the initial infection vector and develop recommendations for preventing future inci
Publish At:2017-06-01 11:15 | Read:484 | Comments:0 | Tags:Incident Response Malware Threat Intelligence Advanced Malwa

When a Cyber Crisis Hits, Know Your OODA Loops

In the months since we began simulating full-scale cyberattacks for customers at our IBM X-Force Command Center in Cambridge, Massachusetts, I’ve watched a steady stream of corporate security teams confront the hair-raising experience of a simulated cyberattack. The Command Center recreates the whole crisis from start to finish, featuring a controlled,
Publish At:2017-05-30 22:30 | Read:343 | Comments:0 | Tags:CISO Incident Response X-Force Research Chief Information Se

Incident Response: Planning for the Attack Before It Happens

By now, you’ve no doubt heard of WannaCry, the ransomware attack that impacted over 300,000 victims in more than 100 countries over the past 10 days. While we’ve all focused on effective patching strategies to prevent further infection, an important part of the discussion is how to plan for a successful incident response (IR) to ransomware and o
Publish At:2017-05-25 13:35 | Read:365 | Comments:0 | Tags:Incident Response X-Force Research IBM IBM Security IBM X-Fo

Unwrapping the Mystery: Did a Big, Slimy Internet Worm Make Hundreds of Organizations WannaCry?

Two weeks into the WannaCry aftermath, response teams are getting back to normal, organizations are re-evaluating their infrastructures, and even the bitcoin payments the fraudsters were collecting have almost stopped trickling in. It’s time now to look into the data to find clues about what made WannaCry spread so rapidly and with such a wide scope.
Publish At:2017-05-25 13:35 | Read:517 | Comments:0 | Tags:Advanced Threats Incident Response Threat Intelligence IBM X

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud