Sidebar

Security teams used to counter new threats by adding more tools, but the cost was more complexity. It's time to re-think cybersecurity – to counter complex threats with simple, unified, collaborative solutions.

See how IBM Security is re-writing the rules at
https://www.ibm.com/security

IBM X-Force Red investigated how cyber criminals might seek to exploit package deliveries to hack into corporate or personal home networks right from the office mailroom or someone’s front door.

Think of the volume of boxes moving through a corporate mailroom daily, or the packages being dropped off on the porch of a CEO’s home, sitting within range of their home wi-fi.

IBM X-Force Command Centers represent a quantum leap in IBM Security’s core capabilities and are built upon the latest era of cognitive security solutions and the industry's top talent. By combining leading technology, industry-proven processes, and the support of skilled security experts, IBM X-Force Command Centers help clients stay ahead of the most advanced threats.

With our move to X-Force Command Center, we expand traditional security operation center (SOC) functions to include threat management, threat hunting, SIEM services, cognitive, and even cyber range functionality.

IBM X-Force Command Center introduces the first commercial cyber range built in a state-of-the-art facility that immerses clients/potential clients in a simulated SOC using tactics and protocols designed to anticipate and defend against current and future cyber threats. It will provide critical cyber security-related crisis leadership skills in a safe “live fire” environment where participants can experience the effects of live malware, DDoS, and other traditional and more advanced attacks. The participants will operate real tools, investigate active infections, and respond to internal and external cyber security events. 

https://www.ibm.com/security/services/managed-security-services/security-operations-centers

Learn more about IBM Cloud Security Solutions: http://ibm.biz/cloud-security-solutions

Check out this lightboard video with Nataraj Nagaratnam from IBM Cloud as he maps out what cloud security is and explains how important it is for enterprises to incorporate it into their business operations.

Get started for free on IBM Cloud:
http://ibm.biz/free-lite-cloud-account

A DDoS attack is an attempt by an attacker to create so much traffic or congestion to a target application, or an internet application, that it impedes the traffic flow of normal visitors.

Check out this quick overview video with Ryan Sumner as he goes over the basics of a DDoS attack and what to look for if you think you may be under attack.

Learn more about IBM Cloud Internet Services: http://ibm.biz/cloud-internet-services 
Learn more about DDoS:
http://ibm.biz/networking-complete-guide

Get started for free on IBM Cloud:   https://ibm.co/2JXUDRi

While internships are a great way to get a "foot in the door" at a company, these interns' social media habits could be helping hackers get a foot in the door as well through inadvertent insider attacks.

IBM X-Force Red social engineering expert Stephanie Carruthers: https://securityintelligence.com/posts/interns-and-social-media-a-goldmine-for-hackers/

Go behind the scenes of a simulated cybersecurity breach and hear about one financial technology company’s experiences testing their incident response preparedness in the IBM X-Force Command Cyber Tactical Operations Center and Cyber Range in Cambridge.

Conventional MDM, EMM and UEM solutions lack the ability to discover and prioritize the areas that have the most meaningful impact on your organization. Instead, they rely on YOU and your team to self-discover risks and opportunities related to your endpoints, their users, apps, content and data.

Cognitive computing is about augmenting our traditional computing systems with an understanding of formerly opaque data such as natural human language, imagery, etc. In this video Jeb Linton, Chief Security Architect at IBM Watson Group, describes how marrying the worlds of structured and semi-structured machine data to the world of natural language provides a more complete picture of the security landscape.

To learn more, please visit: http://ibm.co/2eWAbfX

IBM Security has launched a new team of global experts - IBM X-Force IRIS, to help clients prepare for and rapidly respond to security threats. Our seasoned experts and consultants deliver threat intelligence services, incident preparedness planning and onsite response services to help organizations stay ahead of the threat.

http://ibm.co/2cwsKOK

IBM X-Force Command Centers represent a quantum leap in IBM Security’s core capabilities and are built upon the latest era of cognitive security solutions and the industries top talent. By combining leading technology, industry proven processes, and the support of skilled security experts, IBM X-Force Command Centers help clients stay ahead of the most advanced threats.

With our move to X-Force Command Center we expand traditional security operation center (SOC) functions and to include threat management, threat hunting, SIEM services, cognitive and even cyber range functionality.

IBM X-Force Command Center introduces the first commercial cyber range built in a state-of-the-art facility that immerses clients/potential clients in a simulated SOC using tactics and protocols designed to anticipate and defend against current and future cyber threats. It will provide critical cyber security-related crisis leadership skills in a safe “live fire” environment where participants can experience the effects of live malware, DDoS, and other traditional and more advanced attacks. The participants will operate real tools, investigate active infections, and respond to internal and external cyber security events.

This cyber simulator provides clients with unique hands-on experience to understand the dynamics of a cyber attack. Not only does our cyber range emulate a training environment but also explores actual IP addresses of sites to uncover malware and mimics any industry to identify specific malware prone to attack so our centers can help defend against it. It empowers organizations to understand potential security tools and services needed, improves an organization’s skills regarding incident response and crisis management, and enhances collaboration and communication when responding to an attack.

www.ibm.com/security/XForceCommand

X-Force Command Center, IBM Security's global array of Security Operations Centers, protect 4,500 clients across 133 countries.
X-Force Command Centers serve as IBM Security’s global threat monitoring and intelligence centers, built with cognitive in mind. Acting as a single global entity, the command centers provide 24/7/365 security monitoring for IBM’s Managed Security Services clients. X-Force Command Centers currently handle over 20 billion security events per day, with the capability to scale to over 35 billion+ security events daily (or 1 TRILLION events each month.)
The 24x7 “watch floor” within the SOC incorporates state-of-the-art technology, programs, processes and facilities that increase collaboration and capacity to help our analysts work smarter.
Our analysts have access to tools like Watson for Cyber Security arming them with the ability to quickly synthesize large amounts of data and come to evidenced based recommendations and conclusions quickly for our clients.
Using the IBM X-Force Intelligence, the SOCs bring in 200 thousand new pieces of threat intelligence daily by leveraging insights from analysis of over 100 million web pages and images, collect data from 270 million endpoints, and pull in the expansive library of threat research from IBM’s X-Force Threat Intelligence team.

www.ibm.com/security/XForceCommand

Are you taking the right steps to protect your organization from insider threats? IBM X-Force data shows that 60% of all attacks involved insiders in 2015, and 44.5% involved malicious, trusted users. Keeping your organization safe starts with your people – knowing who they are, and being able to predict or spot malicious behaviors.

LATEST COMMENTS