5 Posts

Jim Brennan

Vice President of Strategy and Offering Management, IBM Security

Jim Brennan serves as the Vice President of Strategy and Offering Management for the Security Operations & Response portfolio of IBM Security. He has over 20 years of experience in the development, management and marketing of technology products, 16 of which have been focused on information security. Jim joined IBM from Dell SecureWorks, where he led the product management team responsible for infrastructure security services. Earlier in his career, Jim spent eight years with Internet Security Systems (now part of IBM), where he held positions in research and development, product management and product marketing.Other notable roles include positions with Red Hat, EMS Technologies and the U.S. Department of Defense. Jim holds a bachelor's degree in Mechanical Engineering from the Georgia Institute of Technology, and a Master of Business Administration from the Goizueta Business School at Emory University.

Written By Jim Brennan

New Quad9 DNS Service Makes the Internet Safer and More Private

Quad9 goes far beyond standard DNS name resolution to improve privacy, security scalability and ease of use.

It’s Time to Go Beyond Next-Generation Endpoint Security

To protect the most vulnerable gateways into their networks, IT leaders must go beyond next-generation endpoint security with IBM BigFix Detect.

IBM MaaS360 Goes Global to Keep Data Local

MaaS360 empowers organizations to fully enable, manage and secure their mobile devices, apps, docs and data on a global scale.

Detection Is NOT the New Prevention

What does it take to stop today's extremely motivated and well-trained cyber attackers? Is prevention pretty much dead? Is rapid detection the new prevention? There has been a dangerous shift recently in the prevailing wisdom of the security...

Four Essential Layers to Protect Against Advanced Threats

IBM's strategy around advanced threat protection and how the recent Trusteer acquisition adds a critical component for approaching the challenges associated with more sophisticated attackers and the designer malware they frequently employ during...