About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Filter by
Filter by
- Content Format
- Content Type
Filter by
1 – 30 of 538 items
[]
538 results 25 March 2025
Explainer
What are Digital Credentials?
Digital credentials are a secure way to verify an identity without paper credentials. Examples include digital badges and digital certificates.
Digital credentials

25 March 2025
Insights
Why Social Engineering Still Works
Social engineering will always be a problem, but we can all do our part to make scammers' jobs harder.
Social engineering

17 March 2025
Explainer
What Is Privilege Escalation?
Privilege escalation is a cyberattack technique in which a threat actor alters or elevates their permissions in a target system.
Privileged access management

14 March 2025
Explainer
What is Biometric Authentication?
Biometric authentication uses physical features—like facial features, iris scans or fingerprints—to verify peoples' identities.
Biometric authentication

11 March 2025
Explainer
What is Threat Intelligence?
Threat intelligence is detailed, actionable threat information for preventing and fighting cyberthreats targeting an organization.
Threat intelligence

28 February 2025
Explainer
What is Customer Identity and Access Management (CIAM)?
Customer identity and access management (CIAM) manages the digital identities of customers and other external end users.
Consumer identity and access management

21 February 2025
Explainer
What is The Common Vulnerability Scoring System (CVSS)?
The Common Vulnerability Scoring System (CVSS) is a widely used framework for classifying and rating software vulnerabilities.
Vulnerability scoring

21 February 2025
News
SoaPy: Stealthy enumeration of Active Directory environments through ADWS
Due to modern defensive solutions, targeted and large-scale enumeration of Active Directory (AD) environments has become increasingly detected. Learn more on that and a new tool to help fight it.
Security vulnerabilities

18 February 2025
Explainer
What is Digital Identity?
A digital identity is a profile tied to a specific user, machine or other entity in an IT ecosystem. Digital IDs help track activity and stop cyberattacks.
Digital identity

14 February 2025
News
Smoltalk: RCE in open source agents
Hugging Face announced the release of smolagents, a lightweight framework for building AI agents. However, X-Force discovered a vulnerability and Hugging Face was quick to implement a fix. Learn more.
Security vulnerabilities

14 February 2025
News
4 ways to bring cybersecurity into your community
4 ways to bring cybersecurity into your community | IBM
Cybersecurity

11 February 2025
News
The straight and narrow — How to keep ML and AI training on track
The straight and narrow — How to keep ML and AI training on track | IBM
AI security

07 February 2025
Insights
Will AI threaten the role of human creativity in cyber threat detection?
AI has already automated many repetitive, time-consuming cybersecurity tasks. But will AI threaten the human creativity threat detection depends on?
Threat detection and response

05 February 2025
News
Stress-testing multimodal AI applications is a new frontier for red teams
Stress-testing multimodal AI applications is a new frontier for red teams | IBM
Red teams

04 February 2025
News
DeepSeek's rise prompts essential security dialogue
Chinese AI startup DeepSeek is emerging as a competitive player in the generative AI space, but security experts are raising concerns about potential vulnerabilities in its platform. Here's what you need to know.
AI security

31 January 2025
News
AI decision-making: Where do businesses draw the line?
AI decision-making: Where do businesses draw the line? | IBM
AI security

30 January 2025
News
When ransomware kills: Attacks on healthcare facilities
When ransomware kills: Attacks on healthcare facilities | IBM
Ransomware

29 January 2025
News
AI and cloud vulnerabilities aren’t the only threats facing CISOs today
AI and cloud vulnerabilities aren’t the only threats facing CISOs today | IBM
Vulnerability management

27 January 2025
Explainer
What Is Tokenization?
Tokenization converts sensitive data into a nonsensitive digital replacement that maps back to the original in order to protect sensitive information.
Tokenization

23 January 2025
Explainer
What Is ASPM?
ASPM is a cybersecurity approach that focuses on safeguarding applications against security threats throughout the application lifecycle.
Application security

23 January 2025
News
Taking the fight to the enemy: Cyber persistence strategy gains momentum
Taking the fight to the enemy: Cyber persistence strategy gains momentum | IBM
Cybersecurity

22 January 2025
News
2024 Cloud Threat Landscape Report: How does cloud security fail?
2024 Cloud Threat Landscape Report: How does cloud security fail? | IBM
Cloud security

21 January 2025
News
Are attackers already embedded in U.S. critical infrastructure networks?
Are attackers already embedded in U.S. critical infrastructure networks? | IBM
Infrastructure security

17 January 2025
Explainer
Data Sovereignty vs. Data Residency
Data sovereignty determines who has authority over data. Data residency refers to the geographical location of data.
Data security

16 January 2025
News
The current state of ransomware: Weaponizing disclosure rules and more
The current state of ransomware: Weaponizing disclosure rules and more | IBM
Ransomware

14 January 2025
News
Why do software vendors have such deep access into customer systems?
Why do software vendors have such deep access into customer systems? | IBM
Cybersecurity

07 January 2025
Explainer
What Is Threat Hunting?
Threat hunting is a proactive approach to identifying previously unknown and ongoing threats in an organization's network.
Threat hunting

07 January 2025
Insights
Mobile device security: Why protection is critical in the hybrid workforce
As many organizations transition to hybrid work environments, poorly defended mobile devices offer a rich target for malicious actors.
Mobile security

06 January 2025
News
Abusing MLOps platforms to compromise ML models and enterprise data lakes
With the rush to implement AI across organizations came the increase in the use of MLOps platforms and a greater risk of attack. Learn more about MLOps platforms and how threat actors are using them.
AI security

06 January 2025
Explainer
What Is Data Detection and Response (DDR)?
Data detection and response (DDR) is a cybersecurity technology that monitors and protects data in any format and location across multicloud environments.
Data detection and response
