Please turn on your JavaScript for this page to function normally.
Identity intelligence and the complexity of security

An employee’s unauthorized access to client information can leave a firm vulnerable to security breaches and audits. Many companies juggle the administration of …

IBM unveils mobile security service

IBM unveiled its Hosted Mobile Device Security Management service that helps organizations protect against data loss and other risks caused by device theft, unauthorized …

New analytics advance IBM security intelligence portfolio

IBM is extending its proven security services portfolio to include enhanced analytic tools and services to provide deeper, real-time analysis of advance threats. By detecting …

Demystifying cloud computing security

Phil Neray is the VP, Data Security Strategy, InfoSphere Guardium & Optim at IBM. In this interview Phil talks about the complex issues surrounding cloud computing …

IBM to acquire Q1 Labs

IBM announced a definitive agreement to acquire security intelligence software provider Q1 Labs. The move aims to accelerate IBM’s efforts to help clients more …

Critical vulnerabilities triple in 2011

Adoption of mobile devices such as smartphones and tablets in the enterprise, including the “Bring Your Own Device” approach, which allows personal devices to …

IBM acquires i2 to fight crime and security threats

IBM will acquire i2 to accelerate its business analytics initiatives and help clients address crime, fraud and security threats. Financial terms were not disclosed. With more …

IBM WebSphere Portal XSS vulnerability

A vulnerability has been reported in IBM WebSphere Portal, which can be exploited by malicious people to conduct cross-site scripting attacks, according to Secunia. Certain …

IBM Informix Storage Manager security bypass

A vulnerability has been reported in IBM Informix Storage Manager, which can be exploited by malicious people to bypass certain security restrictions, according to Secunia. …

The complex information security landscape

In this interview, Latha Maripuri, Director, IBM Security Services and Marc van Zadelhoff, Director of Strategy, IBM Security Solutions, discuss the increasingly complex …

Multiple vulnerabilities in IBM Tivoli Directory Server

Multiple vulnerabilities have been reported in IBM Tivoli Directory Server, which can be exploited by malicious users to disclose sensitive information and by malicious people …

Vulnerabilities surge: 8,000 recorded in 2010

IBM today released results from its annual X-Force 2010 Trend and Risk Report, highlighting that public and private organizations around the world faced increasingly …

Don't miss

Cybersecurity news