How Chatbots Can Help Bridge Business Continuity and Cybersecurity

A quick web search for “chatbots and security” brings up results warning you about the security risks of using these

Read more

SBA Spoofed in COVID-19 Spam to Deliver Remcos RAT

Between late March and mid-April 2020, IBM X-Force Incident Response and Intelligence Services (IRIS) uncovered a phishing campaign targeting small

Read more

Workforce Versus Consumer IAM: Key Differences and Use Cases

As a consumer, have you ever visited an online retail site only to be bombarded by a pop-up window asking

Read more

A Guide to Easy and Effective Threat Modeling

Threat modeling is a process by which potential threats can be identified, enumerated and prioritized, all from a hypothetical attacker’s

Read more

Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government

Cyberattacks on local government in the U.S. have increased dramatically over the last several years. In 2019 alone, ransomware affected

Read more

Connected Car Security Is a New Kind of Mobile Security Risk

Earlier this year, we published a piece about the need for a cybersecurity wake-up call in the automotive industry. The

Read more

TrickBot Widens Infection Campaigns in Japan Ahead of Holiday Season

The threat group operating the TrickBot Trojan, the most active banking Trojan family according to IBM X-Force data, has been

Read more

What Are Insider Threats and How Can You Mitigate Them?

What is an insider threat? Insider threats are users with legitimate access to company assets who use that access, whether

Read more