IBM Security Access Manager (ISAM) is rated as a leader in the Product, Marketing and Technology Leadership categories in KuppingerCole's Leadership Compass report on access management and federation.
To prepare for the CCPA and other upcoming data privacy regulations, start by applying the best practices and frameworks you used to achieve GDPR readiness when the regulation took effect last May.
At RSAC 2019, IBM Security General Manager Mary O'Brien noted that while the industry has made progress toward improving the experience of women in security, "a little better isn't going to cut it."
The decentralized nature of blockchain, coupled with consensus protocols, helps to address some security needs, but the consequences can be dire if security isn't fully explored.
Two X-Force Red interns discovered 19 previously undisclosed vulnerabilities across five popular visitor management systems that could enable attackers to establish a foothold on corporate networks.
By following the example of industry leaders with mature security analytics capabilities, less advanced organizations can improve SOC visibility and shift from reactive to proactive threat detection.
IBM X-Force saw a decline in ransomware in 2018 as cybercriminals shifted tactics to cryptojacking and attacks that don’t leverage malware.
Cybersecurity Leaders From Maersk and Westfield Insurance Discuss Digital Transformation at Major Industry Event
IBM Security General Manager Mary O'Brien sat down for a fireside chat with Kevin Baker, CISO of Westfield Insurance, and Maersk CISO Andy Powell about how digital transformation impacts security.
How Former Bomb Disposal Expert and Lighting Designer Shaked Vax Pivoted Toward a Cybersecurity Career
Shaked Vax dismantled bombs and created light shows for rock stars before starting his cybersecurity career. Now he's leading IBM Trusteer's move into frictionless identity management.
By adopting artificial intelligence solutions to help execute the MITRE ATT&CK framework, security teams can reduce dwell times, guide threat hunting endeavors and lighten the load of SOC analysts.