Software Vulnerabilities March 25, 2015 Made for Headlines: Do Designer Vulnerabilities Compromise Security? 3 min read - As vulnerabilities are now branded with catchy names and logos, security researchers should be careful not to compromise the responsible disclosure process
X-Force March 16, 2015 IBM X-Force Threat Intelligence Quarterly – 1Q 2015 < 1 min read - The 2016 IBM X-Force Threat Intelligence Report is now available! Read the complete report today. When we look back in history to review and understand the past year, you can be assured it will be remembered as a year of…
Mainframe February 3, 2015 Infrastructure Protection for the Threats of Today and Tomorrow 3 min read - The Infrastructure Protection track at InterConnect will feature insights from the IBM X-Force Research and Development team and customer success stories.
Software Vulnerabilities January 29, 2015 Ghost in the Machine: Linux Zero-Day Vulnerability Opens Door for Attack 3 min read - A Linux zero-day vulnerability, dubbed "Ghost," was recently discovered. It lets malicious code execute on servers that use the glibc functionality.
X-Force January 21, 2015 ‘Blackhat’: Hollywood’s Latest Take on Hacking 3 min read - "Blackhat" the movie is an example of Hollywood getting hacking right, portraying many hacking scenarios that could be found in the real world.
Endpoint January 14, 2015 German Steel Mill Meltdown: Rising Stakes in the Internet of Things 3 min read - The report of a 2014 attack on a German steel mill brings together several key points on the Internet of Things and motivations for cyberattacks.
X-Force January 9, 2015 On the Passing of Michael Hamelin 2 min read - IBM would like to honor Michael Hamelin, a former X-Force employee who was tragically killed in an automobile accident in December 2014.
X-Force November 24, 2014 IBM X-Force Still Ahead of the Threat 86,000 Vulnerabilities Later 2 min read - IBM X-Force has evolved to meet the needs of the changing security market, developing ahead-of-the-threat protection strategies and educating clients.
Mainframe August 28, 2014 Intrusion Prevention and the Seven-Year Itch 3 min read - Intrusion prevention technology has had to continuously evolve in the past seven years to meet today's network security needs.