Sometimes, it only takes one moment — one life-changing incident — for the most trustworthy employee to become an insider threat. As Nick Cavalancia, founder of Microsoft MVP, observed at Spiceworld 2019, malicious user behavior is all about intent. Coming up with the best approach to addressing insider threats means…
Read More
This is the second installment in a two-part series about data discovery and classification. Be sure to read part one for the full story. Discovering and classifying data across the enterprise is crucial to any data protection strategy, but it can be complicated due to the constantly shifting nature of…
Read More
Incident response and management requires continual growth. Your team will not become proficient overnight, and acquiring knowledge, expertise and maturity takes time, effort, training and a lot of practice. It’s also not a single milestone that you reach and then rest on your laurels. As attackers continue to apply innovative…
Read More
X-Force Red, IBM Security’s team of hackers, is hired by a variety of companies to find and help fix vulnerabilities exposing their most important assets to potential attacks. One sector that is increasingly looking into the security of their products is internet of things (IoT) manufacturers that build and sell…
Read More