220 Posts

Security Intelligence Staff

Security Intelligence Staff

    Security Intelligence strives to be the leading site for technical and business-focused security content. Security is an essential factor for every business, and we want to help you adapt to and safeguard against its ever-changing landscape.

    Written By Security Intelligence Staff

    Security Webinar Series: InterConnect On-Demand

    Looking to improve your organization's security posture? Watch these on-demand webinars featuring content presented at IBM InterConnect 2016.

    Overcoming Cybersecurity Challenges in the White House and Beyond

    Taking incremental steps against cybersecurity challenges puts organizations further behind in countering the threat environment.

    Hey! You! Get Onto My Cloud at Cloud Security World 2016

    With 18 talks on the program, it's hard to highlight just a few, but here are some top picks for the upcoming Cloud Security World 2016 event.

    IBM X-Force Research: Beware of Older Cyber Attacks

    Although they are often eclipsed by new and emerging threats, two attack patterns that date back to 1969 — footprinting and brute force attacks — remain widely used by attackers around the world. Because the IoT devices and industrial control...

    IBM Unveils Enhancements to Its Mobile Productivity Tools and Data Protection Controls

    MaaS360's latest enhancements include a major redesign of the user experience and tighter integration with security tools for greater mobile productivity.

    Solve the Case with Identity Governance and Intelligence

    In the age of the Insider Threat, you can never be too careful with who has access to what. Whether from malicious insiders or inadvertent actors, it is critical that organizations ensure proper access and governance.

    IBM X-Force Research: The Inside Story on Botnets

    Botnets have plagued us for almost two decades now. Named by combining the words “robot” and “network,” a botnet is a network of computers infected with malicious software and remotely commanded and controlled by cybercriminals we call...

    Don’t Drown in a Sea of Vulnerabilities

    Organizations are under increasing pressure to prevent security breaches by sophisticated teams that seek to steal sensitive data or other proprietary information—attacks that potentially put the organization, its employees or its customers at...

    IBM X-Force Research: Outdated Encryption Standards Pose a Serious Risk of Data Breach

    Many businesses today depend upon encryption standards that date back to the late 1990s. These standards are now considered insufficient for protecting sensitive, confidential or private data, according to the National Institute of Standards and...

    Under the Radar: How to Protect Against the Insider Threat

    Organizations must combat the risk of an insider threat with access controls, management and monitoring for privileged accounts.