178 Posts

Security Intelligence Staff

Security Intelligence Staff

Security Intelligence strives to be the leading site for technical and business-focused security content. Security is an essential factor for every business, and we want to help you adapt to and safeguard against its ever-changing landscape.

Written By Security Intelligence Staff

Mobile Vision 2020

Based on the "Mobile Vision 2020" report by Forrester Consulting, this infographic examines the impact of mobility, IoT, and artificial intelligence on the future of business transformation.

Cyberattacks: The Next Health Care Epidemic

Health care records are extremely valuable targets for identity theft and ransomware. This infographic shows 5 ways to help protect your health care organization and your patients.

An Introduction to Maritime Cybersecurity

In this podcast Meridian.US founder Jonathan McConnell discusses some of the main security concerns in the maritime environment.

IBM BigFix: Keeping Innovation and Trust at the Forefront of Everything We Do

In accordance with IBM's core values, the BigFix community emphasizes and embodies trust and personal responsibility in all relationships.

AIS Stresses Enhancing Your Endpoint Management and Security Strategy

AIS recently published a blog about augmenting your existing endpoint solution with additional capabilities, such as the ones available with IBM BigFix.

IoT Security Fact #5: As Data Accumulates, Exposure Issues Will Increase

The "Five Indisputable Facts about IoT Security" podcast concludes with IoT Security Fact #5: As data accumulates, exposure issues will increase.

IoT Security Fact #4: Weak Configurations Will Persist

This episode of the IBM podcast series, "Five Indisputable Facts about IoT Security," looks at IoT Security Fact #4: Weak configurations will persist.

Use Email to Manage Threat Intelligence Collections

The IBM X-Force Exchange includes an email inbox feature that cuts down on information overload and enables analysts to easily share threat intelligence.

IBM X-Force Research: Weaponizing the Internet of Things

It is widely known that cybercriminals are populating botnets with easily exploitable Internet of Things (IoT) devices such as security cameras, webcams and DVRs. With the proliferation of IoT devices accelerating significantly — expected to...

IBM X-Force Research: Cybercrime Riding Tax Season Tides

Cybercrime is a year-round profession, but there’s no question that fraudsters take advantage of seasonal events such as gift-giving season in the winter and tax filing deadlines in the spring. The most common fraud types that ensue this time...