Three popular version control systems were found to contain vulnerabilities that could enable threat actors to steal source code.
Cognitive security solutions such as IBM Watson for Cyber Security help analysts process overwhelming amounts of threat data during incident investigations
Companies and governments around the world must test their cloud security capabilities to keep sensitive data safe from hacktivists and cyber enemies.
EDR solutions enable threat hunting teams to fine-tune behavioral detection rules and determine the techniques by which malware spreads through a network.
An evolved security monitoring and analytics platform — as opposed to a tools-based approach — can help analysts make better use of available threat data.
IBM X-Force Red marked its first anniversary with the addition of security specialists, including Space Rogue, bolstering the team's talent roster.
The U.S. energy infrastructure requires enhanced protection, and CISOs must educate their employees about security risks to those critical assets.
TrickBot Habla Español: Trojan Widens Its Attack Scope in Spain, Brings Redirection Attacks to Local Banks
The TrickBot Trojan has been steadily ramping up its activity this year, going into a rather intensive period of updates and attacks that started in Q2.
Virus protection software has come a long way in the past 30 years, and the advent of machine learning represents a bright future for malware fighters.
The information and communication technology (ICT) industry suffered the second-most attacks out of all sectors monitored by IBM X-Force in 2016.