- Content Format
- Content Type
Digital credentials are a secure way to verify an identity without paper credentials. Examples include digital badges and digital certificates.

Social engineering will always be a problem, but we can all do our part to make scammers' jobs harder.

Privilege escalation is a cyberattack technique in which a threat actor alters or elevates their permissions in a target system.

Biometric authentication uses physical features—like facial features, iris scans or fingerprints—to verify peoples' identities.

Threat intelligence is detailed, actionable threat information for preventing and fighting cyberthreats targeting an organization.

Customer identity and access management (CIAM) manages the digital identities of customers and other external end users.

The Common Vulnerability Scoring System (CVSS) is a widely used framework for classifying and rating software vulnerabilities.

Due to modern defensive solutions, targeted and large-scale enumeration of Active Directory (AD) environments has become increasingly detected. Learn more on that and a new tool to help fight it.

A digital identity is a profile tied to a specific user, machine or other entity in an IT ecosystem. Digital IDs help track activity and stop cyberattacks.

Hugging Face announced the release of smolagents, a lightweight framework for building AI agents. However, X-Force discovered a vulnerability and Hugging Face was quick to implement a fix. Learn more.

4 ways to bring cybersecurity into your community | IBM

The straight and narrow — How to keep ML and AI training on track | IBM

AI has already automated many repetitive, time-consuming cybersecurity tasks. But will AI threaten the human creativity threat detection depends on?

Stress-testing multimodal AI applications is a new frontier for red teams | IBM

Chinese AI startup DeepSeek is emerging as a competitive player in the generative AI space, but security experts are raising concerns about potential vulnerabilities in its platform. Here's what you need to know.

AI decision-making: Where do businesses draw the line? | IBM

When ransomware kills: Attacks on healthcare facilities | IBM

AI and cloud vulnerabilities aren’t the only threats facing CISOs today | IBM

Tokenization converts sensitive data into a nonsensitive digital replacement that maps back to the original in order to protect sensitive information.

ASPM is a cybersecurity approach that focuses on safeguarding applications against security threats throughout the application lifecycle.

Taking the fight to the enemy: Cyber persistence strategy gains momentum | IBM

2024 Cloud Threat Landscape Report: How does cloud security fail? | IBM

Are attackers already embedded in U.S. critical infrastructure networks? | IBM

Data sovereignty determines who has authority over data. Data residency refers to the geographical location of data.

The current state of ransomware: Weaponizing disclosure rules and more | IBM

Why do software vendors have such deep access into customer systems? | IBM

Threat hunting is a proactive approach to identifying previously unknown and ongoing threats in an organization's network.

As many organizations transition to hybrid work environments, poorly defended mobile devices offer a rich target for malicious actors.

With the rush to implement AI across organizations came the increase in the use of MLOps platforms and a greater risk of attack. Learn more about MLOps platforms and how threat actors are using them.

Data detection and response (DDR) is a cybersecurity technology that monitors and protects data in any format and location across multicloud environments.
