Threat hunting

Protect your enterprise and fortify cybersecurity with actionable threat intelligence Identify and disrupt your cyber threats Rapidly uncover time-sensitive insights about your cyber threat actors and their motivations so you can disrupt current threats and enhance security measures against future ones. IBM helps cyber analysts conduct cyber threat hunting by turning disparate data sets into…

Quantum Key Distribution Gets a Speed Boost

A method for scrambling data to protect it from the super powerful computers of the future has received a speed boost from a team of researchers from Duke and Ohio State universities and the Oak Ridge National Laboratory. The method uses quantum key distribution to guard data from prying eyes, wrote Nurul T. Islam, Charles…

Dealing with Evolving Cyber Threats

Cyberattacks against healthcare organizations are evolving in many ways, including new schemes to steal credentials as well as assaults by low-skilled hackers using ransomware-as-a-service products, says Eric Rydberg of Sophos. See Also: Addressing the Identity Risk Factor in the Age of ‘Need It Now’ In a video interview at Information Security Media Group’s recent Healthcare…

Password fatigue could be putting your company at risk

Employees using weak passwords could be putting your company at risk more than previously thought, new research has claimed. A report from LastPass claims that the sheer number of passwords being used by employees even within an average-sized business means that it is increasingly tricky to keep tabs on which are used for certain accounts…

Wait, Do You Really Think That’s A YouTube URL?

  While scrolling on Facebook how you decide which link/article should be clicked or opened? Facebook timeline and Messenger display title, description, thumbnail image and URL of every shared-link, and this information are enough to decide if the content is of your interest or not. Since Facebook is full of spam, clickbait and fake news…