January 19, 2017 By Rob Patey < 1 min read

Illustrations by Nathan Salla.

Welcome to “In Security,” the web comic that takes a lighter look at the dark wave of threats crashing across business networks, endpoints, data and users. Get acquainted with the team and catch up by reading Episode 001, Episode 002, Episode 003 and Episode 004.


Protecting the Castle With IBM

Securing data today — in many ways — is like the castles of yore.
We’ve built walls of fire to protect the servers, moats to thwart malware and more.

But is this the right way to protect all our data? There are some who will beg to differ.
The problem with castles is they keep things inside, when today’s business world is much bigger.

You can’t fortify mobile, for instance, as you did your servers. BYOD made quite sure of that.
And when you do secure mobile with too strong a hand, you can watch productivity fall flat.

Also, when the mortar has dried on ramparts built high, the resources to build more start lagging.
Which is trouble, since enemies that once attacked from the ground just hired a ransomware dragon.

Fear not, gentle reader, because all is not lost. We’ll never leave you in the dark ages!
IBM has an immune system that grows with your kingdom, conceived by our security sages.

Learn more about the IBM Security Immune System

More from Network

New cybersecurity sheets from CISA and NSA: An overview

4 min read - The Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA) have recently released new CSI (Cybersecurity Information) sheets aimed at providing information and guidelines to organizations on how to effectively secure their cloud environments.This new release includes a total of five CSI sheets, covering various aspects of cloud security such as threat mitigation, identity and access management, network security and more. Here's our overview of the new CSI sheets, what they address and the key takeaways from each.Implementing…

Databases beware: Abusing Microsoft SQL Server with SQLRecon

20 min read - Over the course of my career, I’ve had the privileged opportunity to peek behind the veil of some of the largest organizations in the world. In my experience, most industry verticals rely on enterprise Windows networks. In fact, I can count on one hand the number of times I have seen a decentralized zero-trust network, enterprise Linux, macOS network, or Active Directory alternative (FreeIPA). As I navigate my way through these large and often complex enterprise networks, it is common…

Easy configuration fixes can protect your server from attack

4 min read - In March 2023, data on more than 56,000 people — including Social Security numbers and other personal information — was stolen in the D.C. Health Benefit Exchange Authority breach. The online health insurance marketplace hack exposed the personal details of Congress members, their families, staff and tens of thousands of other Washington-area residents. It appears the D.C. breach was due to “human error”, according to a recent report. Apparently, a computer server was misconfigured to allow access to data without proper…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today