We are happy to announce that IBM Security is back and part of our IBM Middleware User Community. As some of the members know, Security was originally part of the Tivoli Software Group (SWG) division and had a great presence within the Middleware group. We are now in our sixth year as IBM Security and felt it was time to go back to our roots.

Community Matters

When the tech industry was younger, user groups and communities were formulated around technologies. SHARE was the first, bringing IBM Mainframe users together in 1955! Over the years, user groups have evolved their focus to include a wide array of enterprise applications, and IBM is no exception. I remember the days when I was the User Group leader for the former Rational Software. As much as things change, they certainly stay the same.

Such groups offer a sense of community and the ability to share information with subject matter experts (SMEs) who understand the challenges that can accompany modern enterprise technologies. The Security division recognizes this fact and we want to provide this peer-to-peer support via our newly formulated IBM Security Community.

A Focus on Collaboration

Our community will be founded on the guiding principle of collaboration. Opening the channels of communication and encouraging collaboration between organizations is a step in the right direction to improving cybersecurity. The bad guys have built an ecosystem that thrives on collaboration and information sharing, so the good guys should be doing the same.

Our clients are constantly monitoring when the next attack will happen, and we remain vigilant to ensure we are providing our clients with the best ability to respond to these advanced threats. But are we ready for the next WannaCry or Petya?

We want to bring our clients and experts together in our IBM Security Community to help meet these challenges, share concerns and provide a platform to enable peer-to-peer communication — and ultimately help each other meet the business challenges that many of us face.

Better Together

We need to band together, because it’s a complex world we live in. The culmination of these relationships between client-vendor and customer-customer happens at the community level and within our local user meetings.

We want our community to turn into a hive of people looking not only to improve our product/service, but also to learn from and help one another. We are just starting out, and want your participation and feedback for how to get our group growing and thriving.

Join Our Community

Please join our virtual IBM Middleware User Community and see what user groups are happening in your region. Share what you want to hear from IBM Security. We are glad to be back!

Join our user community today

More from

Worms of Wisdom: How WannaCry Shapes Cybersecurity Today

WannaCry wasn't a particularly complex or innovative ransomware attack. What made it unique, however, was its rapid spread. Using the EternalBlue exploit, malware could quickly move from device to device, leveraging a flaw in the Microsoft Windows Server Message Block (SMB) protocol. As a result, when the WannaCry "ransomworm" hit networks in 2017, it expanded to wreak havoc on high-profile systems worldwide. While the discovery of a "kill switch" in the code blunted the spread of the attack and newly…

Emotional Blowback: Dealing With Post-Incident Stress

Cyberattacks are on the rise as adversaries find new ways of creating chaos and increasing profits. Attacks evolve constantly and often involve real-world consequences. The growing criminal Software-as-a-Service enterprise puts ready-made tools in the hands of threat actors who can use them against the software supply chain and other critical systems. And then there's the threat of nation-state attacks, with major incidents reported every month and no sign of them slowing. Amidst these growing concerns, cybersecurity professionals continue to report…

RansomExx Upgrades to Rust

IBM Security X-Force Threat Researchers have discovered a new variant of the RansomExx ransomware that has been rewritten in the Rust programming language, joining a growing trend of ransomware developers switching to the language. Malware written in Rust often benefits from lower AV detection rates (compared to those written in more common languages) and this may have been the primary reason to use the language. For example, the sample analyzed in this report was not detected as malicious in the…

Why Operational Technology Security Cannot Be Avoided

Operational technology (OT) includes any hardware and software that directly monitors and controls industrial equipment and all its assets, processes and events to detect or initiate a change. Yet despite occupying a critical role in a large number of essential industries, OT security is also uniquely vulnerable to attack. From power grids to nuclear plants, attacks on OT systems have caused devastating work interruptions and physical damage in industries across the globe. In fact, cyberattacks with OT targets have substantially…