155 Posts

Security Intelligence Staff

Security Intelligence Staff

Security Intelligence strives to be the leading site for technical and business-focused security content. Security is an essential factor for every business, and we want to help you adapt to and safeguard against its ever-changing landscape.

Written By Security Intelligence Staff

Are You Ready to See Your IAM Vision Come to Life?

IBM is proud to introduce IBM IdentityDev, a platform that allows you to contribute, collaborate and help shape the future of IAM solutions.

Top Four Reasons to Attend InterConnect 2016

There are many reasons why a security professional would want to attend InterConnect 2016, but we've narrowed it down to the top four.

IBM X-Force Research: Penetration Testing a Building Automation System

There is much focus in the IT industry on securing web servers, applications and critical network infrastructure from cyber attack, but what about the new class of web-enabled devices that are connected to the systems that control heating, lights...

IBM X-Force Research: Shining a Light on Blind SQL Injection

Weaknesses in default database installations can make your sensitive information vulnerable to SQL injection attacks. One such weakness, failure to perform input validation, has led to massive data breaches at large enterprises and small businesses...

Health Care Data Breaches: From Sidelines to Center Stage

Examine this infographic to learn how and why health care targets are rising to the top of the attackers’ target list.  

What We’re Thankful for This Holiday Season: Cybersecurity Edition

As the season of reflection and thanks is upon us, we here at Security Intelligence decided to ask what our contributors are thankful for this year.

IBM X-Force Threat Intelligence Quarterly – 4Q 2015

In the final issue of 2015, the IBM X-Force® Threat Intelligence Quarterly shifts the focus to our in-house experts at IBM Security Services. With its extensive global reach and experience addressing cyber security concerns and incidents affecting...

IBM X-Force Research: The Price of Loyalty Programs

A corporation’s customer service center is suddenly inundated with calls from customers who say they’ve received emails telling them their email addresses and passwords for their loyalty program accounts have been changed, even though they...

IDC White Paper: CISOs’ Guide to Enabling a Cloud Security Strategy – Focus on SaaS

The forward thinking enterprise is already fully engaged in various cloud projects and applying controls in an ad hoc way. More importantly, even the most conservative organizations are likely to have unsanctioned cloud apps in use by their...

Free E-Book: Integrated Threat Management For Dummies

Every industry has been hit hard by hackers and cybercriminal organizations. If you don’t have the right measures in place to adequately prevent, detect, or respond to incidents, you could pay the price. Integrated Threat Management for Dummies,...