52 Posts

Pamela Cobb

Market Segment Manager, IBM X-Force and Security Intelligence

Pamela Cobb directs product marketing activities for the IBM X-Force and Threat Protection offerings developing messaging, collateral, website content. She came to IBM through the acquisition of Internet Security Systems, where she managed the Competitive Intelligence function. Elsewhere in IBM, Pam has worked in database marketing and market insights focusing on Midmarket and Hardware products She's earned the IBM Forward Thinker Award and IBM Global Best Database Marketing Practice Award, and has been published in the Journal of Competitive Intelligence.

Written By Pamela Cobb

The Bacon of Security: How Threat Intelligence Complements Cloud Protection

Threat intelligence is one security seasoning that most people can't get enough of, and now it's being added to cloud security.

Is It the Breadth of the Breach or the Value of the Volume?

Organizations that suffer a breach face extremely high costs, but cybercriminals don't have to cough up as much to start building profiles of victims.

Triple Threat: Engaging a Trifecta of Threat Intelligence From IBM X-Force

The newly launched IBM X-Force Incident Response Services completes the trifecta of actionable threat intelligence from IBM X-Force.

Peanut Butter and Chocolate and IBM X-Force

IBM X-Force is launching a two-part webinar series that will bring together cutting-edge security research and firsthand client experiences.

IBM X-Force Security Research in the Spotlight at InterConnect 2016

IBM's X-Force security research team has been hard at work, and many of their findings and analyses will be on display during InterConnect 2016 sessions.

The Ripple Effect of the CISO in the C-Suite

The role of the CISO is growing in prominence and importance, which has a massive impact on the rest of the C-suite and the organization as a whole.

A Kitten and an Information Security Analyst Walk Into a Bar…

What happens when a kitten and an information security analyst walk into a bar? In one scenario, the kitten teaches the expert some things about security.

Are Attackers Out-collaborating You on Mobile Application Security?

Strong mobile application security needs to be a part of your organization's overall security posture if you want to uncover vulnerabilities.

Making a Better Threat Management Sandwich

Find the best way to compile everything you want into your threat management sandwich — without making it so big it's impossible to consume.

The Myth of Stock-Busting Breaches

Do major data breaches wind up costing companies in the stock market? We examine this myth using some recent examples of high-profile breaches.