IBM X-Force Incident Response and Intelligence Services (IRIS) responds to security incidents across the globe. During a recent incident response investigation, our team identified new attacks by the financially motivated attack group ITG08, also known as FIN6. ITG08 is an organized cybercrime gang that has been active since 2015, mostly…
Read More
Privileged access management (PAM) tools offer significant security and compliance benefits that can be used to build a business case. This can be tricky, however, because most of the benefits are intangible. In other words, they’re based on what-if scenarios: In the event of a security breach, what costs would…
Read More
Most post-merger cybersecurity challenges arise when the acquiring company fails to fully assess the cybersecurity posture of its acquisition target. After an acquisition, all vulnerabilities and incidents are the responsibility of the acquiring company. According to a Ponemon Institute survey, 59 percent of companies that experienced a data breach in…
Read More
Although security information and event management (SIEM) has been around for more than a decade, the solution continues to evolve. But too many enterprises still don’t know which security use cases SIEM can take on, how it can capture and leverage data — structured and unstructured, internal and external —…
Read More