Threat hunting

Protect your enterprise and fortify cybersecurity with actionable threat intelligence Identify and disrupt your cyber threats Rapidly uncover time-sensitive insights about your cyber threat actors and their motivations so you can disrupt current threats and enhance security measures against future ones. IBM helps cyber analysts conduct cyber threat hunting by turning disparate data sets into…

Quantum Key Distribution Gets a Speed Boost

A method for scrambling data to protect it from the super powerful computers of the future has received a speed boost from a team of researchers from Duke and Ohio State universities and the Oak Ridge National Laboratory. The method uses quantum key distribution to guard data from prying eyes, wrote Nurul T. Islam, Charles…

Dealing with Evolving Cyber Threats

Cyberattacks against healthcare organizations are evolving in many ways, including new schemes to steal credentials as well as assaults by low-skilled hackers using ransomware-as-a-service products, says Eric Rydberg of Sophos. See Also: Addressing the Identity Risk Factor in the Age of ‘Need It Now’ In a video interview at Information Security Media Group’s recent Healthcare…