Please turn on your JavaScript for this page to function normally.
Characteristics of effective security leaders

A new IBM study of security leaders reveals that they are increasingly being called upon to address board-level security concerns and as a result are becoming a more strategic …

Protect data before sending it to the cloud

IBM inventors have developed a technique for protecting sensitive data prior to transmitting it to the cloud. The patented invention will overcome barriers to client adoption …

IBM unveils new cloud solution

IBM announced a new cloud solution that combines software analytics and cloud security services to fend off web-based DDoS attacks for organizations doing business on the web …

Internet of Things starter kit from IBM and Libelium

IBM and Libelium released an Internet of Things Starter Kit to enable dozens of sensor applications ranging from monitoring parking spaces or air pollution to providing …

Attackers sharpen skills: What that really means for CISOs

Today, IBM is revealing the results of its X-Force 2013 Mid-Year Trend and Risk Report, which shows that Chief Information Security Officers (CISOs) must increase their …

IBM acquires Trusteer

IBM announced a definitive agreement to acquire Trusteer, a provider of software that helps protect organizations against financial fraud and security threats. Financial terms …

IBM unveils software to identify and predict security risk

IBM announced an integrated security intelligence solution that helps organizations identify key vulnerabilities in real-time. QRadar Vulnerability Manager gives security …

Cisco teams with IBM, Lancope, LogRhythm, Splunk and Symantec

Cisco introduced new developments with security partners and information-sharing techniques under its Cisco Security Technology Partner Ecosystem. Enabled by a new context …

Sophisticated threats and thinking like the attacker

Sophisticated attackers are making us think differently about how we approach security. They are methodical, persistent, creative and often times well funded. Approaching …

Open standards are key for security in the cloud

The current divide between proprietary and open approaches to enterprise cloud computing has implications beyond the obvious. More than just issues of cloud interoperability …

IBM combines security intelligence and big data

Advanced attacks, widespread fraud and the pervasive use of social media, mobile and cloud computing are drastically altering the security landscape. As organizations …

IBM tops U.S. patent list for 2012

IBM received a record 6,478 patents in 2012 for inventions that will enable fundamental advancements across key domains including analytics, Big Data, cybersecurity, cloud, …

Don't miss

Cybersecurity news