IBM prevents services from running compromised code
IBM inventors have patented a technique that can enable businesses to improve cloud security and support secure transactions by preventing mobile devices from accessing …
IBM fuels new era of cognitive apps built in the cloud
IBM will make its IBM Watson technology available as a development platform in the cloud, to enable a worldwide community of software application providers to build a new …
IBM to acquire Fiberlink Communications
IBM announced a definitive agreement to acquire Fiberlink Communications, a mobile management and security company. Financial terms were not disclosed. With Fiberlink’s …
Characteristics of effective security leaders
A new IBM study of security leaders reveals that they are increasingly being called upon to address board-level security concerns and as a result are becoming a more strategic …
Protect data before sending it to the cloud
IBM inventors have developed a technique for protecting sensitive data prior to transmitting it to the cloud. The patented invention will overcome barriers to client adoption …
IBM unveils new cloud solution
IBM announced a new cloud solution that combines software analytics and cloud security services to fend off web-based DDoS attacks for organizations doing business on the web …
Internet of Things starter kit from IBM and Libelium
IBM and Libelium released an Internet of Things Starter Kit to enable dozens of sensor applications ranging from monitoring parking spaces or air pollution to providing …
Attackers sharpen skills: What that really means for CISOs
Today, IBM is revealing the results of its X-Force 2013 Mid-Year Trend and Risk Report, which shows that Chief Information Security Officers (CISOs) must increase their …
IBM acquires Trusteer
IBM announced a definitive agreement to acquire Trusteer, a provider of software that helps protect organizations against financial fraud and security threats. Financial terms …
IBM unveils software to identify and predict security risk
IBM announced an integrated security intelligence solution that helps organizations identify key vulnerabilities in real-time. QRadar Vulnerability Manager gives security …
Cisco teams with IBM, Lancope, LogRhythm, Splunk and Symantec
Cisco introduced new developments with security partners and information-sharing techniques under its Cisco Security Technology Partner Ecosystem. Enabled by a new context …
Sophisticated threats and thinking like the attacker
Sophisticated attackers are making us think differently about how we approach security. They are methodical, persistent, creative and often times well funded. Approaching …
Featured news
Resources
Don't miss
- Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- Why a push for encryption backdoors is a global security risk
- Innovation vs. security: Managing shadow AI risks
- Commix: Open-source OS command injection exploitation tool