58 Posts

Pamela Cobb

Market Segment Manager, IBM X-Force and Security Intelligence

Pamela Cobb directs product marketing activities for the IBM X-Force and Threat Protection offerings developing messaging, collateral, website content. She came to IBM through the acquisition of Internet Security Systems, where she managed the Competitive Intelligence function. Elsewhere in IBM, Pam has worked in database marketing and market insights focusing on Midmarket and Hardware products She's earned the IBM Forward Thinker Award and IBM Global Best Database Marketing Practice Award, and has been published in the Journal of Competitive Intelligence.

Written By Pamela Cobb

Infrastructure Protection for the Threats of Today and Tomorrow

The Infrastructure Protection track at InterConnect will feature insights from the IBM X-Force Research and Development team and customer success stories.

Ghost in the Machine: Linux Zero-Day Vulnerability Opens Door for Attack

A Linux zero-day vulnerability, dubbed "Ghost," was recently discovered. It lets malicious code execute on servers that use the glibc functionality.

‘Blackhat’: Hollywood’s Latest Take on Hacking

"Blackhat" the movie is an example of Hollywood getting hacking right, portraying many hacking scenarios that could be found in the real world.

German Steel Mill Meltdown: Rising Stakes in the Internet of Things

The report of a 2014 attack on a German steel mill brings together several key points on the Internet of Things and motivations for cyberattacks.

On the Passing of Michael Hamelin

IBM would like to honor Michael Hamelin, a former X-Force employee who was tragically killed in an automobile accident in December 2014.

IBM X-Force Still Ahead of the Threat 86,000 Vulnerabilities Later

IBM X-Force has evolved to meet the needs of the changing security market, developing ahead-of-the-threat protection strategies and educating clients.

Grabbing the Heartbleed Vulnerability by the (Long) Tail

The Heartbleed vulnerability in the OpenSSL library is so pervasive that the long tail of impact is expected to last at least two years.

Intrusion Prevention and the Seven-Year Itch

Intrusion prevention technology has had to continuously evolve in the past seven years to meet today's network security needs.