Advanced Threats April 9, 2015 Top Security Myths That Could Leave Your Organization Vulnerable to an Attack 5 min read - These four pervasive security myths may keep organizations from moving to the higher level of security maturity that is needed to fight today's attackers.
Data Protection March 6, 2015 Big Data Requires Big Protection 3 min read - Big data management presents complex challenges, and enterprises need real-time monitoring and alerting to track what is happening and what may happen.
Cloud Security February 26, 2015 Has Your Cloud Security Become a Juggling Act? 3 min read - Cloud security is what prevents many businesses from making the leap and adopting the cloud to manage their data and protect their information
Application Security February 26, 2015 Three Must-Have Capabilities for Effective Cloud-Based Application Security Testing 3 min read - Cloud services deserve application security testing processes that can seamlessly integrate with the build process to create an automated system.
Endpoint February 24, 2015 Philosophy vs. Reality: How IBM Achieves Mobile Security for 400,000 Employees 3 min read - Most companies today, including IBM, face the challenge of managing and securing mobile devices. Learn how IBM protects its workforce of 400,000 employees.
Cloud Security January 13, 2015 How IBM’s Patent Leadership Translates to the Future of Cloud Security 2 min read - Inventing new approaches and coming up with sophisticated innovations will be key for organizations looking to develop cloud security strategies.
CISO January 8, 2015 Cloud Adoption Can Boost Security for an SMB 3 min read - A small or midsize business (SMB) can benefit from adopting the cloud because of its increased security level and lower costs.
Cloud Security December 24, 2014 23 Best Practices for Cloud Security 6 min read - Cloud security is no longer just a luxury. Here are some best practices to consider when partnering with a third-party cloud service provider.
CISO December 17, 2014 Security Technology a Top Focus for CISOs 2 min read - Security leaders are focusing their attention on improving security technology in the face of innovations in the cloud, mobile devices and big data.
December 9, 2014 Security Researchers: Google App Engine May Contain More Than 30 Vulnerabilities 2 min read - Holes in Google App Engine could allow third parties to access or steal information from the company's cloud-based service for hosting Web apps.