Characteristics of effective security leaders
A new IBM study of security leaders reveals that they are increasingly being called upon to address board-level security concerns and as a result are becoming a more strategic …
Protect data before sending it to the cloud
IBM inventors have developed a technique for protecting sensitive data prior to transmitting it to the cloud. The patented invention will overcome barriers to client adoption …
IBM unveils new cloud solution
IBM announced a new cloud solution that combines software analytics and cloud security services to fend off web-based DDoS attacks for organizations doing business on the web …
Internet of Things starter kit from IBM and Libelium
IBM and Libelium released an Internet of Things Starter Kit to enable dozens of sensor applications ranging from monitoring parking spaces or air pollution to providing …
Attackers sharpen skills: What that really means for CISOs
Today, IBM is revealing the results of its X-Force 2013 Mid-Year Trend and Risk Report, which shows that Chief Information Security Officers (CISOs) must increase their …
IBM acquires Trusteer
IBM announced a definitive agreement to acquire Trusteer, a provider of software that helps protect organizations against financial fraud and security threats. Financial terms …
IBM unveils software to identify and predict security risk
IBM announced an integrated security intelligence solution that helps organizations identify key vulnerabilities in real-time. QRadar Vulnerability Manager gives security …
Cisco teams with IBM, Lancope, LogRhythm, Splunk and Symantec
Cisco introduced new developments with security partners and information-sharing techniques under its Cisco Security Technology Partner Ecosystem. Enabled by a new context …
Sophisticated threats and thinking like the attacker
Sophisticated attackers are making us think differently about how we approach security. They are methodical, persistent, creative and often times well funded. Approaching …
Open standards are key for security in the cloud
The current divide between proprietary and open approaches to enterprise cloud computing has implications beyond the obvious. More than just issues of cloud interoperability …
IBM combines security intelligence and big data
Advanced attacks, widespread fraud and the pervasive use of social media, mobile and cloud computing are drastically altering the security landscape. As organizations …
IBM tops U.S. patent list for 2012
IBM received a record 6,478 patents in 2012 for inventions that will enable fundamental advancements across key domains including analytics, Big Data, cybersecurity, cloud, …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments