Today, we're announcing IBM Security Connect, an open, cloud-based platform that is capable of analyzing federated security data across unconnected tools and environments.
In its latest report for identity management and governance, Forrester recognized IBM Security as a Leader.
As a young girl in Romania, Irina Nicolae was fascinated with machinery and how different parts fit together. Today, she conducts AI research to develop ways to protect this technology from threats.
Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework.
DeepLocker has changed the game of malware evasion by taking a fundamentally different approach from any other current evasive and targeted malware. Here's what you need to know.
Security remains the primary concern for many CIOs in adopting hybrid IT and cloud technologies as they pursue application modernization.
An attacker who gains access won't necessarily walk away with an organization's proprietary data. Here's how a cyberattack framework can help you subvert an attacker already in a network.
Sridhar Muppidi, CTO of cloud security and IAM at IBM Security, and Shamla Naidoo, global CISO at IBM, took time to discuss topics ranging from AI and blockchain to threat sharing and collaboration.
Whether you're most interested in smart city security, vulnerability management or an epic game of CTF, we'll help you get the most out of your time in Las Vegas this week.
IBM was named a leader in the 2018 Magic Quadrant for Unified Endpoint Management Tools report for its completeness of vision and ability to execute.