About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Filter by
Filter by
- Content Format
- Content Type
Filter by
1 – 30 of 588 items
[]
588 results 07 April 2025
Explainer
Physical Security in Cybersecurity
Most of us think of cybersecurity as a purely digital affair, but cyberattacks can actually begin right here in the physical world.
Physical security

25 March 2025
Explainer
What are Digital Credentials?
Digital credentials are a secure way to verify an identity without paper credentials. Examples include digital badges and digital certificates.
Digital credentials

25 March 2025
Insights
Why Social Engineering Still Works
Social engineering will always be a problem, but we can all do our part to make scammers' jobs harder.
Social engineering

18 March 2025
News
Bypassing Windows Defender Application Control with Loki C2
Microsoft offers a bug bounty for qualifying bypasses into Windows Defender Application Control. Learn how IBM's X-Force team found a bypass using Loki C2.
Adversary simulation

17 March 2025
Explainer
What Is Privilege Escalation?
Privilege escalation is a cyberattack technique in which a threat actor alters or elevates their permissions in a target system.
Privileged access management

14 March 2025
Explainer
What is Biometric Authentication?
Biometric authentication uses physical features—like facial features, iris scans or fingerprints—to verify peoples' identities.
Biometric authentication

11 March 2025
Explainer
What is Threat Intelligence?
Threat intelligence is detailed, actionable threat information for preventing and fighting cyberthreats targeting an organization.
Threat intelligence

28 February 2025
Explainer
What is Customer Identity and Access Management (CIAM)?
Customer identity and access management (CIAM) manages the digital identities of customers and other external end users.
Consumer identity and access management

21 February 2025
Explainer
What is The Common Vulnerability Scoring System (CVSS)?
The Common Vulnerability Scoring System (CVSS) is a widely used framework for classifying and rating software vulnerabilities.
Vulnerability scoring

21 February 2025
News
SoaPy: Stealthy enumeration of Active Directory environments through ADWS
Due to modern defensive solutions, targeted and large-scale enumeration of Active Directory (AD) environments has become increasingly detected. Learn more on that and a new tool to help fight it.
Security vulnerabilities

18 February 2025
Explainer
What is Digital Identity?
A digital identity is a profile tied to a specific user, machine or other entity in an IT ecosystem. Digital IDs help track activity and stop cyberattacks.
Digital identity

14 February 2025
News
Smoltalk: RCE in open source agents
Hugging Face announced the release of smolagents, a lightweight framework for building AI agents. However, X-Force discovered a vulnerability and Hugging Face was quick to implement a fix. Learn more.
Security vulnerabilities

14 February 2025
News
4 ways to bring cybersecurity into your community
4 ways to bring cybersecurity into your community | IBM
Cybersecurity

13 February 2025
Insights
How red teaming helps safeguard the infrastructure behind AI models
While open-source licensing and cloud computing propel innovation in the AI space, they’re also a source of risk. Red teams can help keep models secure.
Red teams

11 February 2025
News
The straight and narrow — How to keep ML and AI training on track
The straight and narrow — How to keep ML and AI training on track | IBM
AI security

10 February 2025
Insights
Reducing ransomware recovery costs in education
The education sector is uniquely vulnerable to ransomware attacks. These proactive steps can help your organization stay safe.
Ransomware

07 February 2025
Insights
Will AI threaten the role of human creativity in cyber threat detection?
AI has already automated many repetitive, time-consuming cybersecurity tasks. But will AI threaten the human creativity threat detection depends on?
Threat detection and response

06 February 2025
Insights
Hacking the mind: Why psychology matters to cybersecurity
Today, cybersecurity and incident response are no longer solely a technical issue — it is a fundamentally human one.
Cyber hacking

05 February 2025
News
Stress-testing multimodal AI applications is a new frontier for red teams
Stress-testing multimodal AI applications is a new frontier for red teams | IBM
Red teams

05 February 2025
Insights
Cybersecurity awareness: Apple's cloud-based AI security system
In an interview with Ruben Boonen, CNE Capability Development Lead at IBM, we dig into what researchers think of Apple's Private Cloud Compute system.
AI security

04 February 2025
Insights
How AI-driven SOC co-pilots will change security center operations
AI-driven SOC "co-pilots" are topping the lists for 2025's cybersecurity predictions, providing round-the-clock assistance to security analysts.
Security operations center

04 February 2025
News
DeepSeek's rise prompts essential security dialogue
Chinese AI startup DeepSeek is emerging as a competitive player in the generative AI space, but security experts are raising concerns about potential vulnerabilities in its platform. Here's what you need to know.
AI security

03 February 2025
Insights
CISOs drive the intersection between cyber maturity and business continuity
In the evolving landscape of cyber threats, the role of the CISO is becoming more integral to organizational resilience and business continuity.
Cybersecurity

31 January 2025
News
AI decision-making: Where do businesses draw the line?
AI decision-making: Where do businesses draw the line? | IBM
AI security

30 January 2025
News
When ransomware kills: Attacks on healthcare facilities
When ransomware kills: Attacks on healthcare facilities | IBM
Ransomware

29 January 2025
News
AI and cloud vulnerabilities aren’t the only threats facing CISOs today
AI and cloud vulnerabilities aren’t the only threats facing CISOs today | IBM
Vulnerability management

27 January 2025
Insights
How secure are green data centers? Consider these 5 trends
Green data centers are a great way for organizations to embrace sustainability. However, these centers also come with some unique risks.
Infrastructure security

27 January 2025
Explainer
What Is Tokenization?
Tokenization converts sensitive data into a nonsensitive digital replacement that maps back to the original in order to protect sensitive information.
Tokenization

24 January 2025
Insights
How cyberattacks on grocery stores could threaten food security
Grocery store shoppers at many chains recently ran into an unwelcome surprise – empty shelves and delayed prescriptions resulting from a major cyberattack.
Cyberattacks

23 January 2025
Explainer
What Is ASPM?
ASPM is a cybersecurity approach that focuses on safeguarding applications against security threats throughout the application lifecycle.
Application security
