- Content Format
- Content Type
Digital credentials are a secure way to verify an identity without paper credentials. Examples include digital badges and digital certificates.

Social engineering will always be a problem, but we can all do our part to make scammers' jobs harder.

Privilege escalation is a cyberattack technique in which a threat actor alters or elevates their permissions in a target system.

Biometric authentication uses physical features—like facial features, iris scans or fingerprints—to verify peoples' identities.

Threat intelligence is detailed, actionable threat information for preventing and fighting cyberthreats targeting an organization.

Customer identity and access management (CIAM) manages the digital identities of customers and other external end users.

The Common Vulnerability Scoring System (CVSS) is a widely used framework for classifying and rating software vulnerabilities.

Due to modern defensive solutions, targeted and large-scale enumeration of Active Directory (AD) environments has become increasingly detected. Learn more on that and a new tool to help fight it.

A digital identity is a profile tied to a specific user, machine or other entity in an IT ecosystem. Digital IDs help track activity and stop cyberattacks.

Hugging Face announced the release of smolagents, a lightweight framework for building AI agents. However, X-Force discovered a vulnerability and Hugging Face was quick to implement a fix. Learn more.

4 ways to bring cybersecurity into your community | IBM

While open-source licensing and cloud computing propel innovation in the AI space, they’re also a source of risk. Red teams can help keep models secure.

The straight and narrow — How to keep ML and AI training on track | IBM

The education sector is uniquely vulnerable to ransomware attacks. These proactive steps can help your organization stay safe.

AI has already automated many repetitive, time-consuming cybersecurity tasks. But will AI threaten the human creativity threat detection depends on?

Stress-testing multimodal AI applications is a new frontier for red teams | IBM

AI-driven SOC "co-pilots" are topping the lists for 2025's cybersecurity predictions, providing round-the-clock assistance to security analysts.

Chinese AI startup DeepSeek is emerging as a competitive player in the generative AI space, but security experts are raising concerns about potential vulnerabilities in its platform. Here's what you need to know.

In the evolving landscape of cyber threats, the role of the CISO is becoming more integral to organizational resilience and business continuity.

AI decision-making: Where do businesses draw the line? | IBM

When ransomware kills: Attacks on healthcare facilities | IBM

AI and cloud vulnerabilities aren’t the only threats facing CISOs today | IBM

Green data centers are a great way for organizations to embrace sustainability. However, these centers also come with some unique risks.

Tokenization converts sensitive data into a nonsensitive digital replacement that maps back to the original in order to protect sensitive information.

Grocery store shoppers at many chains recently ran into an unwelcome surprise – empty shelves and delayed prescriptions resulting from a major cyberattack.

ASPM is a cybersecurity approach that focuses on safeguarding applications against security threats throughout the application lifecycle.

Taking the fight to the enemy: Cyber persistence strategy gains momentum | IBM

2024 Cloud Threat Landscape Report: How does cloud security fail? | IBM

Are attackers already embedded in U.S. critical infrastructure networks? | IBM

Data sovereignty determines who has authority over data. Data residency refers to the geographical location of data.
