August 18, 2016 Public Cloud Trumps Local Security, Remains Top IT Concern — What Gives? 2 min read - Public cloud services have become more secure than on-premises options. Still, many IT professionals are hesitant to move their data off-site.
Cloud Security August 2, 2016 Cloud Adoption and Challenges in Asia-Pacific 2 min read - Global cloud adoption has increased over the years and continues to grow at a rapid pace, especially in the Asia-Pacific region.
July 26, 2016 Industrial Espionage Actors Now Serving Up Server Attacks 2 min read - Industrial espionage is on the way up in the age of cloud computing. How can organizations embrace this technology and protect themselves?
Cloud Security May 31, 2016 Quantum Computing Comes to the Cloud 2 min read - IBM's introduction of quantum computing services on the cloud could change cybersecurity, cryptography and testing methods as we know it.
Network March 29, 2016 Security Solutions for the Virtual Network: Part III 2 min read - There are many security challenges stemming from the implementation of a virtual network, but luckily, there are ways to acclimate to the technology.
Network March 22, 2016 Security Challenges With the Virtual Network: Part II 2 min read - A cloud-based virtual network is a far cry from the infrastructure most organizations currently have, which means it brings some security challenges.
Mainframe February 16, 2016 Three Things You Need to Know About Mainframes in the Cloud — and Why the z13s Rocks! 4 min read - IBM has announced the z13s, a secure, high-volume, transaction-designed rocket ship ready to help businesses enhance their transaction processing.
Mainframe November 24, 2015 What Are the Risks of Legacy Infrastructure? 2 min read - Using legacy infrastructure does more than drive up the costs of maintenance; it also hinders innovation and increases risks related to security.
Cloud Security October 22, 2015 Don’t Fly Blind in the Clouds: How Cognitive Security Aids Cloud Computing 4 min read - Cognitive security can make initiatives such as cloud computing safer, scalable and more manageable for enterprises of any size.
Identity & Access October 13, 2015 Who’s Watching the Front Door? 3 min read - A strong, centralized, intelligent access management solution can help slam the front door on attackers before they creep into enterprise networks.