Hey guys ! You guessed it from the title, today I would like to talk about X-Force ! A lot of information is available in many places, but it's always easier when things are centralised. So I would ...
Endpoint Detection and Response (EDR) is becoming increasingly important considering the myriad types of security threat vectors. Many enterprises provide their employees with multiple endpoints, which ...
Today, we are faced with the increasing challenges of dealing with more aggressive and persistent threat actors. This all happens while being inundated with information, which is full of misinformation ...
IBM Security QRadar SOAR (previously Resilient), is a Security Orchestration, Automation, and Response (SOAR) platform, is designed to streamline your Security Operations Center (SOC) with an automated ...
Android Enterprise has been here for a number of years at this point and you may be noticing that some features of your MaaS360 subscription are not working as expected. This could be due to you not using ...
A common function that MaaS360 customers utilize is location tracking for their corporate owned devices. This may be used to track down a lost or stolen device or even monitor a delivery vehicle. Each ...
The purpose of this blog is to show how, from any integration that does artifact enrichment from the QRadar SOAR App Exchange , we can create a framework that will publish the right information, on the ...
Hello QRadar Community! In this article, let's take a critical look at Windows User Account Control (UAC), some common attack types used to bypass this control mechanism, and some detection methods ...
If you are unfamiliar with Guardium Insights, let’s refresh your memory: it is a modern data security hub built on Red Hat OpenShift, deployed as microservices in Kubernetes containers. It can stream ...
IBM CICS Transaction Server for z/OS, 6.1 was announced on April 5, 2022, with a planned availability date of June 17, 2022. Toleration fixes for zSecure 2.2.0, 2.2.1, 2.3.0, 2.3.1, 2.4.0, and 2.5.0 have ...
In March of this year, the Biden administration issued warnings about state-sponsored cyberattacks targeting U.S. critical infrastructure. The warnings cited “evolving intelligence” which may have been ...
Co-authored by @Deepti Swain We are going through unprecedented times when most of the workforce is remote and work is done from home, with increasing number of employees bringing their own personal ...
Co-authored by @DIPIKA AGGARWAL In Part-1 of this blog series Secure Enterprise Data through IBM MaaS360 Windows Information Protection , we explored how Windows Information Protection(WIP) through ...
Co-Author : Rama Grandhi Overview: IBM Security MaaS360 with Watson offers the capability for multiple administrators to manage devices and users across an organization/account. However, there will ...
Our following Python Libraries have been updated to version 44.1.2953 : https://pypi.org/project/resilient https://pypi.org/project/resilient-lib https://pypi.org/project/resilient-circuits ...
EDIT : <Entries to this Early Access Programme are now closed. Please reach out to me directly at gaurav.gyan.sharma@ibm.com for any questions.> Hi QRadar Community, I have more exciting news! ...
Hi QRadar Community, I have a quick but important update for you today! Expanding our suite of IBM QRadar and Cisco integrations even further, I’m happy to announce that we have released an Early ...
Author - @Lakshmeesh C Hegde Exchange Online PowerShell V2 module The Exchange Online PowerShell V2 module (abbreviated as the EXO V2 module) uses modern authentication to connect to the Exchange-related ...
Hi all We had a recent question on the Security Community which prompted me to write this, I had promised it already! This is intended to address how companies using in-house or 3rd-party apps developed ...
Protecting customer data is a top priority for businesses. Security regulations and regular compliance audits aim to help businesses safeguard their data in the face of increasingly sophisticated cyber ...