IBM tops U.S. patent list for 2012
IBM received a record 6,478 patents in 2012 for inventions that will enable fundamental advancements across key domains including analytics, Big Data, cybersecurity, cloud, …
IBM releases ten integrated security solutions
IBM announced a broad set of security software to help holistically secure data and identities. IBM’s new software capabilities help clients better maintain security …
Developing and Hosting Applications on the Cloud
In this book, key developers of the IBM SmartCloud Enterprise share indispensable insights for developing and operating cloud-based solutions on any cloud platform. Drawing on …
IBM appliance controls social media risks
IBM announced a new class of network security appliance that delivers a more granular view of a company’s security posture and a simplified security management …
IBM releases software for developing secure mobile apps
IBM announced new software to help organizations develop mobile applications that are more secure by design. Now, clients can build security into the initial design of their …
A new class of CISO is coming
A new IBM study reveals a clear evolution in information security organizations and their leaders with 25 percent of security chiefs surveyed shifting from a technology focus …
Network anomaly detection appliance by IBM
According to the 2011 IBM X-Force Trend and Risk Report, adversaries ramped up social engineering attacks, and X-Force witnessed mobile exploits having increased by 19 percent …
Complex security architectures and innovation
Martin Borrett is the Director of the IBM Institute of Advanced Security in Europe. He leads the Institute and advises at the most senior level in clients on policy, business, …
Surge in mobile exploits and shell command injection attacks
IBM released the results of its X-Force 2011 Trend and Risk Report which shows surprising improvements in several areas of Internet security such as a reduction in application …
New capabilities for the IBM security intelligence platform
IBM unveiled new capabilities planned for its security intelligence platform designed to combine deep analytics with real-time data feeds from hundreds of different sources to …
Identity intelligence and the complexity of security
An employee’s unauthorized access to client information can leave a firm vulnerable to security breaches and audits. Many companies juggle the administration of …
IBM unveils mobile security service
IBM unveiled its Hosted Mobile Device Security Management service that helps organizations protect against data loss and other risks caused by device theft, unauthorized …
Featured news
Resources
Don't miss
- Mirai botnet behind the largest DDoS attack to date
- 48,000+ internet-facing Fortinet firewalls still open to attack
- Acronis CISO on why backup strategies fail and how to make them resilient
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving