The threat detection and response suite built to help your security teams outsmart threats with speed, accuracy and efficiency.

Spear phishing vs. phishing: what’s the difference?

5 min read - The simple answer: spear phishing is a special type of phishing attack. Phishing is any cyberattack that uses malicious email messages, text messages, or voice calls to trick people into sharing sensitive data (e.g., credit card numbers or social security numbers), downloading malware, visiting malicious websites, sending money to the wrong people, or otherwise themselves, their associates or their employers. Phishing is the most common cybercrime attack vector, or method; 300,479 phishing attacks were reported to the FBI in 2022.…

Research shows extensive use of AI contains data breaches faster and saves significant costs

5 min read - The Cost of a Data Breach 2023 global survey found that extensively using artificial intelligence (AI) and automation benefited organizations by saving nearly USD 1.8 million in data breach costs and accelerated data breach identification and containment by over 100 days, on average. While the survey shows almost all organizations use or want to use AI for cybersecurity operations, only 28% of them use AI extensively, meaning most organizations (72%) have not broadly or fully deployed it enough to realize…

What is a phishing simulation?

5 min read - A phishing simulation is a cybersecurity exercise that tests an organization's ability to recognize and respond to a phishing attack. A phishing attack is a fraudulent email, text or voice message designed to trick people into downloading malware (such as ransomware), revealing sensitive information (such as usernames, passwords or credit card details) or sending money to the wrong people. During a phishing simulation, employees receive simulated phishing emails (or texts or phone calls) that mimic real-world phishing attempts. The messages…

What is the vulnerability management lifecycle?

6 min read - Every month, the National Institute of Standards and Technology (NIST) adds over 2,000 new security vulnerabilities to the National Vulnerability Database. Security teams don't need to track all of these vulnerabilities, but they do need a way to identify and resolve the ones that pose a potential threat to their systems. That's what the vulnerability management lifecycle is for. The vulnerability management lifecycle is a continuous process for discovering, prioritizing and addressing vulnerabilities in a company's IT assets. A typical…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters