Active loading indicator
1 – 30 of 587 items
[]
587 results
25 March 2025
Explainer
What are Digital Credentials?

Digital credentials are a secure way to verify an identity without paper credentials. Examples include digital badges and digital certificates.

Digital credentials
25 March 2025
Insights
Why Social Engineering Still Works

Social engineering will always be a problem, but we can all do our part to make scammers' jobs harder.

Social engineering
18 March 2025
News
Bypassing Windows Defender Application Control with Loki C2

Microsoft offers a bug bounty for qualifying bypasses into Windows Defender Application Control. Learn how IBM's X-Force team found a bypass using Loki C2.

Adversary simulation
17 March 2025
Explainer
What Is Privilege Escalation?

Privilege escalation is a cyberattack technique in which a threat actor alters or elevates their permissions in a target system.

Privileged access management
14 March 2025
Explainer
What is Biometric Authentication?

Biometric authentication uses physical features—like facial features, iris scans or fingerprints—to verify peoples' identities.

Biometric authentication
11 March 2025
Explainer
What is Threat Intelligence?

Threat intelligence is detailed, actionable threat information for preventing and fighting cyberthreats targeting an organization.

Threat intelligence
28 February 2025
Explainer
What is Customer Identity and Access Management (CIAM)?

Customer identity and access management (CIAM) manages the digital identities of customers and other external end users.

Consumer identity and access management
21 February 2025
Explainer
What is The Common Vulnerability Scoring System (CVSS)?

The Common Vulnerability Scoring System (CVSS) is a widely used framework for classifying and rating software vulnerabilities.

Vulnerability scoring
21 February 2025
News
SoaPy: Stealthy enumeration of Active Directory environments through ADWS

Due to modern defensive solutions, targeted and large-scale enumeration of Active Directory (AD) environments has become increasingly detected. Learn more on that and a new tool to help fight it.

Security vulnerabilities
18 February 2025
Explainer
What is Digital Identity?

A digital identity is a profile tied to a specific user, machine or other entity in an IT ecosystem. Digital IDs help track activity and stop cyberattacks.

Digital identity
14 February 2025
News
Smoltalk: RCE in open source agents

Hugging Face announced the release of smolagents, a lightweight framework for building AI agents. However, X-Force discovered a vulnerability and Hugging Face was quick to implement a fix. Learn more.

Security vulnerabilities
14 February 2025
News
4 ways to bring cybersecurity into your community

4 ways to bring cybersecurity into your community | IBM

Cybersecurity
13 February 2025
Insights
How red teaming helps safeguard the infrastructure behind AI models

While open-source licensing and cloud computing propel innovation in the AI space, they’re also a source of risk. Red teams can help keep models secure.

Red teams
11 February 2025
News
The straight and narrow — How to keep ML and AI training on track

The straight and narrow — How to keep ML and AI training on track | IBM

AI security
10 February 2025
Insights
Reducing ransomware recovery costs in education

The education sector is uniquely vulnerable to ransomware attacks. These proactive steps can help your organization stay safe.

Ransomware
07 February 2025
Insights
Will AI threaten the role of human creativity in cyber threat detection?

AI has already automated many repetitive, time-consuming cybersecurity tasks. But will AI threaten the human creativity threat detection depends on?

Threat detection and response
06 February 2025
Insights
Hacking the mind: Why psychology matters to cybersecurity

Today, cybersecurity and incident response are no longer solely a technical issue — it is a fundamentally human one.

Cyber hacking
05 February 2025
News
Stress-testing multimodal AI applications is a new frontier for red teams

Stress-testing multimodal AI applications is a new frontier for red teams | IBM

Red teams
05 February 2025
Insights
Cybersecurity awareness: Apple's cloud-based AI security system

In an interview with Ruben Boonen, CNE Capability Development Lead at IBM, we dig into what researchers think of Apple's Private Cloud Compute system.

AI security
04 February 2025
Insights
How AI-driven SOC co-pilots will change security center operations

AI-driven SOC "co-pilots" are topping the lists for 2025's cybersecurity predictions, providing round-the-clock assistance to security analysts.

Security operations center
04 February 2025
News
DeepSeek's rise prompts essential security dialogue

Chinese AI startup DeepSeek is emerging as a competitive player in the generative AI space, but security experts are raising concerns about potential vulnerabilities in its platform. Here's what you need to know.

AI security
03 February 2025
Insights
CISOs drive the intersection between cyber maturity and business continuity

In the evolving landscape of cyber threats, the role of the CISO is becoming more integral to organizational resilience and business continuity.

Cybersecurity
31 January 2025
News
AI decision-making: Where do businesses draw the line?

AI decision-making: Where do businesses draw the line? | IBM

AI security
30 January 2025
News
When ransomware kills: Attacks on healthcare facilities

When ransomware kills: Attacks on healthcare facilities | IBM

Ransomware
29 January 2025
News
AI and cloud vulnerabilities aren’t the only threats facing CISOs today

AI and cloud vulnerabilities aren’t the only threats facing CISOs today | IBM

Vulnerability management
27 January 2025
Insights
How secure are green data centers? Consider these 5 trends

Green data centers are a great way for organizations to embrace sustainability. However, these centers also come with some unique risks.

Infrastructure security
27 January 2025
Explainer
What Is Tokenization?

Tokenization converts sensitive data into a nonsensitive digital replacement that maps back to the original in order to protect sensitive information.

Tokenization
24 January 2025
Insights
How cyberattacks on grocery stores could threaten food security

Grocery store shoppers at many chains recently ran into an unwelcome surprise – empty shelves and delayed prescriptions resulting from a major cyberattack.

Cyberattacks
23 January 2025
Explainer
What Is ASPM?

ASPM is a cybersecurity approach that focuses on safeguarding applications against security threats throughout the application lifecycle.

Application security
23 January 2025
News
Taking the fight to the enemy: Cyber persistence strategy gains momentum

Taking the fight to the enemy: Cyber persistence strategy gains momentum | IBM

Cybersecurity
1 – 30 of 587 items