Please turn on your JavaScript for this page to function normally.
HNS
IBM acquires Polar Security to address the growing shadow data problem

IBM has acquired Polar Security, an innovator in technology that helps companies discover, continuously monitor and secure cloud and SaaS application data – and addresses the …

HNS
IBM Quantum Safe technology prepares clients for the post-quantum era

IBM announced its new IBM Quantum Safe technology: a comprehensive set of tools and capabilities, combined with IBM’s deep security expertise, designed as an end-to-end …

Cybersecurity risk management
Corporate boards pressure CISOs to step up risk mitigation efforts

While those working in InfoSec and GRC have high levels of confidence in their cyber/IT risk management systems, persistent problems may be making them less effective than …

lock
IBM Security QRadar Suite streamlines security analysis throughout the incident process

IBM unveiled at the RSA conference 2023, its new Security QRadar Suite designed to unify and accelerate the security analyst experience across the full incident lifecycle. The …

ransomware
Quantifying cyber risk vital for business survival

Healthcare, manufacturing, and utilities are suffering long-term financial impact of major cyber attacks, according to ThreatConnect. “With the National Cyber Strategy coming …

threat hunting
Threat hunting programs can save organizations from costly security breaches

Cybersecurity threats to organizations are only increasing, not only in number but in scope, according to Team Cymru. The true cost of cyber breaches Proactive threat hunting …

Hardware
IBM unveils new options to help clients reach their sustainability goals

IBM has unveiled new single frame and rack mount configurations of IBM z16 and IBM LinuxONE 4, expanding their capabilities to a broader range of data center environments. …

Handshake
IBM partners with Wasabi to power data insights across hybrid cloud environments

IBM and Wasabi Technologies are collaborating to drive data innovation across hybrid cloud environments. This collaboration aims to allow enterprises to run applications …

IBM
Ransomware gangs are exploiting IBM Aspera Faspex RCE flaw (CVE-2022-47986)

Attackers are exploiting a critical vulnerability (CVE-2022-47986) in the IBM Aspera Faspex centralized file transfer solution to breach organizations. About CVE-2022-47986 …

ransomware
Defenders on high alert as backdoor attacks become more common

Although ransomware‘s share of incidents declined only slightly from 2021 to 2022, defenders were more successful detecting and preventing ransomware, according to IBM. …

college
Challenging cost misconceptions in STEM education

Job seekers, students, and career changers around the world want to pursue roles related to science, technology, engineering, and mathematics (STEM) across different …

Handshake
CompTIA collaborates with IBM to prepare more people for tech-related careers

CompTIA has reported that up to 2,000 people across the country, from communities that are underrepresented in technology, will be trained to work as technical support and …

Don't miss

Cybersecurity news