186 Posts

Security Intelligence Staff

Security Intelligence Staff

Security Intelligence strives to be the leading site for technical and business-focused security content. Security is an essential factor for every business, and we want to help you adapt to and safeguard against its ever-changing landscape.

Written By Security Intelligence Staff

The Importance of Penetration Testing

IBM Security recently sat down with Ian Glover, the President of CREST, a not for profit organization that serves the needs of a technical information security marketplace that requires the services of a regulated professional services industry. In...

Watson for Cyber Security: Shining a Light on Unstructured Data

80% of the world’s data has been invisible to traditional systems. Until now. The best security professionals build their body of knowledge every day through experience, talking with colleagues, attending conferences and staying up to date with...

What’s in Your Event Cybersecurity Strategy?

Event cybersecurity strategies and tools can help improve the digital security and, in turn, the physical security of guests at your event.

IBM X-Force Special Report: 2016 Brazilian Threat Landscape

As Brazil draws the focus of the world this summer, businesses and visitors will be concerned with protecting both their physical and cyber assets. In this special report, IBM X-Force raises awareness of cybercrime and recommends practices to...

IBM X-Force Research: The Importance of Thwarting Command Injection Attacks

Command injection attacks are among the most common attacks on the Internet, where numerous entry points offer openings for a system compromise.  The chances of success are enhanced by the complexity of measures needed to defend against them. By...

IBM X-Force Research: Security Trends in the Transportation Industry

Disruption of transportation systems or assets can impact a country’s security, public health and safety while triggering a cascade of issues across other industries. Disruptions to transportation systems or assets can result in incidents ranging...

Security Webinar Series: InterConnect On-Demand

Looking to improve your organization's security posture? Watch these on-demand webinars featuring content presented at IBM InterConnect 2016.

Overcoming Cybersecurity Challenges in the White House and Beyond

Taking incremental steps against cybersecurity challenges puts organizations further behind in countering the threat environment.

Hey! You! Get Onto My Cloud at Cloud Security World 2016

With 18 talks on the program, it's hard to highlight just a few, but here are some top picks for the upcoming Cloud Security World 2016 event.

IBM X-Force Research: Beware of Older Cyber Attacks

Although they are often eclipsed by new and emerging threats, two attack patterns that date back to 1969 — footprinting and brute force attacks — remain widely used by attackers around the world. Because the IoT devices and industrial control...