New studies highlighted a major disconnect between CISOs and the rest of the C-suite when it comes to cyber risk information.

New studies highlighted a major disconnect between CISOs and the rest of the C-suite when it comes to cyber risk information.
securityintelligence.com

IBM Security wins big at the 2016 SC Magazine Awards!

IBM Security was short-listed as a finalist in six categories for the 2016 SC Awards. Winners will be announced June 7 in London.
securityintelligence.com

Data breaches taking $4m toll on businesses’ bottom line; IBM’s Caleb Barlow discusses it with Fortune Magazine live at 11 am ET; check it out here:

Resilient Incident Visualization is a new incident response innovation giving security teams leverage against today’s most complex and sophisticated attacks. Learn more about the industry’s first incident visualization: http://bit.ly/1U7hOTh

התמונה של ‏‎IBM Security‎‏.
‏‏‎IBM Security‎‏ ‏‏מרגיש/ה ‏נרגש/ת‏‏.

Lessons learned from 11 years of cost of data breach research: http://ibm.co/1Xe2Pwo

התמונה של ‏‎IBM Security‎‏.
‏‏‎IBM Security‎‏ ‏‏מרגיש/ה ‏נרגש/ת‏‏.

For the fifth consecutive year, IBM has been recognized as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites. What makes us the leader?

For the fifth consecutive year, IBM has been recognized as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites.
securityintelligence.com

What country ranks as the most hackable? The answer may surprise you.

The National Exposure Index recently ranked the world's most hackable countries, and the results may surprise security professionals.
securityintelligence.com

How do attackers convince potential victims to copy/paste malicious code? It’s easier than it appears.

A new exploit called pastejacking results in victims unwittingly infecting their own machines thanks to malicious code hidden in seemingly normal text.
securityintelligence.com

Overcoming cybersecurity challenges in the White House and beyond:

Taking incremental steps against cybersecurity challenges puts organizations further behind in countering the threat environment.
securityintelligence.com

89% all health care companies suffered at least 1 data breach in last 2 years:

The health care industry is facing a security crisis: According to a recent study, data breaches are becoming all too common for the sector.
securityintelligence.com

Identifying threats is a growing necessity among corporations — and an ongoing issue. But how do we put out the fire before it’s even started? Fortunately there is an existing integrated solution to defend ICS against cyberthreats.

Proactive cybersecurity solutions are needed to protect critical industrial control systems from the growing risk of cyberattacks.
securityintelligence.com

Where should you begin when trying to avoid a social media hack? Sit down with your social media staff and ask these 11 questions:

Avoiding a damaging and embarrassing social media hack starts with building security into all aspects of the organization and embracing best practices.
securityintelligence.com

Dozens of security flaws found in Aruba Networks Products:

Aruba Networks recently admitted to security flaws in its PAPI wireless network protocol — after a security researcher identified the issues.
securityintelligence.com

After LinkedIn comes Fling. More than 40 million logins from Fling are up for sale on the Dark Web.

A years-old hack led to more than 117 million LinkedIn email addresses and passwords being posted online — and this isn't the only hack getting headlines.
securityintelligence.com

There is a new extortion tactic targeting enterprises. Learn how bug poaching works:

Bug poaching may not feel as severe as full-blown advanced attacks that expose your data to the public, but you should treat them just as seriously.
securityintelligence.com

When two organizations merge, participants may be focused on the operational challenges of integrating two different computer systems. While this is an important area of focus, there are other merger considerations that should be top of mind — namely, the systems’ security.

Merger considerations need to be expanded to include cybersecurity and systems concerns, security audits, third-party SLAs and more.
securityintelligence.com

New from IBM X-Force! Marcher mobile bot adds UK targets, steps up banking fraud capabilities:

The Marcher mobile bot is a new Android malware targeting a long list of banks around the world with app overlay screens and SMS hijacking.
securityintelligence.com

Number of PoC exploits has increased dramatically, with many shared via social media.

Researchers attempt to find PoC exploits with good intentions, but that doesn't stop cybercriminals from taking advantage when they have the chance.
securityintelligence.com

Telnet could act as a key for attackers to gain unauthorized access into IoT devices: http://ibm.co/1WjTsel

Savvy cybercriminals are using older technologies such as Telnet to carry out attacks on IoT devices, a recent IBM Security report discovered.
securityintelligence.com

There is a new malware that targets your bank account. The criminals behind GozNym are so sophisticated they can change online banking websites to show full balances even after funds have been transferred out!

New malware has already been used against banks in the U.S., Canada and Europe, bilking customers out of about $4 million.
cnbc.com|של ‏‎CNBC‎‏