10 Posts

Caleb Barlow

Vice President - IBM Security

Caleb Barlow is an accomplished security professional and Vice President at IBM Security, where he leads IBM's Threat Intelligence and Incident Response Teams globally. He was the visionary behind X-Force Command, the worlds most sophisticated watch floor and cyber range.Mr. Barlow has a broad background having led technical teams in product development, product management, strategy, marketing and cloud service delivery. He has led multiple acquisitions including Fiberlink MaaS360 and Net Integration Technologies. Mr. Barlow routinely advises chief information security officers, boards of directors and government officials on security practices, frameworks and strategies to manage the business risk associated with cyber security.Mr. Barlow is a sought after speaker on the subject of security. He has appeared on the TED stage, NBC TODAY, NBC News, Bloomberg Television, CNBC Squawk Box, Yahoo News, Al Jazeera America and the BBC World Service. Caleb's views have appeared in the Wall Street Journal, Washington Post, USA Today, eWeek, FastCompany, Seventeen and dozens of other publications. He has testified to the US Congress and in 2015 he was invited by the President of the UN General Assembly to discuss his views at the United Nations.

Written By Caleb Barlow

New Year, New Threats: Five Security Predictions That Will Take Hold in 2018

The IBM Security X-Force team offered some security predictions for new trends in the technology landscape and threats that are poised to emerge in 2018.

When a Cyber Crisis Hits, Know Your OODA Loops

OODA loops can help System 1-thinking security professionals react swiftly to cyberattacks and embrace an intuitive approach to incident response.

Crisis Leadership, Part 2: What Are We Learning?

In addition to responding to threats in progress, crisis leadership involves rehearsing various responses to prepare for a data breach.

It’s Time for the Democratization of Cybersecurity Data

The widespread democratization of cybersecurity data would enable the IT industry to keep up with cybercriminals who always seem to be one step ahead.

Crisis Leadership: The Missing Link in Cyberattack Defense

C-suite executives often lack the experience and training required to establish and lead a successful cyberattack defense program.

Attackers Shift Sights From Retail to Health Care in 2015

In 2015, there has been a tremendous uptick in the theft of health care data and a decrease in the number of compromised retail records. Why?

Effective Endpoint Security and Management: Coupling Content With Context

The most effective endpoint security solution needs to have both content and context in order to help professionals remediate problems.

Six-Digit Passcodes: Two Small Steps for Smartphones, One Giant Leap for Mobile Security

Apple now requires six-digit passcodes (instead of four) on its devices — meaning two small steps for users, but one giant leap for mobile security.

Keeping Your Data Safe: How to Build an Endpoint Security Strategy Based on Confidence

Is your organization approaching its endpoint security with confidence or fear? Your answer could impact how effectively you prevent data breaches.

How Attackers are Taking Advantage of the Human Factor

The IBM X-Force team just released their Trend and Risk Report which summarizes their findings on emerging threats and the 2013 attack landscape. If you are a CIO, CEO, CISO or a line of business executive this must read report outlines the new...

Co-Written By Caleb Barlow

Ransomware Report: Top Security Threat Expected to Continue Rising in 2017

To pay or not to pay? When it comes to ransomware, that is the question. Despite a rise in attacks, organizations are largely unaware of the threat.