Mitigating malware is possible for smartphone and PC users who follow a few simple computing hygiene tips and security best practices.
A security researcher recently found 191 million people's personal data is available on the Internet thanks to a misconfigured voter database.
IBM and Forrester Research have teamed up to provide some video guidance for enterprises facing the challenges surrounding data protection.
2015 may have been the year of the health care data breach, but many cloud options safely sailed toward better and more efficient data protection.
We all know the mantra that you have to know what data you have before you can protect it. Integrated data classification capabilities in IBM Security Guardium provide a seamless approach to finding, classifying and protecting sensitive data. But...
A white-hat hacker recently discovered sensitive account details for a reported 13 million MacKeeper users have been sitting exposed in a public database.
Protect Your Sensitive Data from Insider Threats Is there in a fox in your hen house? An even better question: Can you tell how much damage it’s done? Join the conversation during this @IBMSecurity tweet chat to get the answers, hear tips, and...
As a CISO, what can you do when your employees are involved in a data breach? What should you know about their potential involvement beforehand?
2015 had a lot of cybersecurity challenges, but many of these incidents have set up 2016 to be a year of opportunities for individuals and enterprises.
As shoppers head to stores during the holiday season, enterprises need to ensure they are protected from POS malware and loyalty card fraud.