CISO September 2, 2014 The Role of Human Error in Successful Security Attacks 4 min read - According to a recent report, 95 percent of successful security attacks are caused by human error, making improved employee education is vital.
X-Force August 25, 2014 Why Heartbleed Still Matters: Hindsight in the Age of Pervasive Exploits 4 min read - The latest IBM X-Force Threat Intelligence Report discusses the aftermath of the Heartbleed vulnerability, what organizations can learn and improve upon.
CISO August 22, 2014 What Leading Analysts Are Saying about IBM’s Acquisition of CrossIdeas 2 min read - IBM recently acquired CrossIdeas to add to the next generation of identity and access governance. Here's what leading industry analysts say about the move.
Intelligence & Analytics August 20, 2014 What Are the Best Network Forensics and Data Capture Tools? 3 min read - An analysis of the top data capture and network forensics tools across six common criteria. See which incident forensics solution scored the best overall.
July 31, 2014 IBM Announces the Acquisition of CrossIdeas 5 min read - The Next Generation of Identity and Access GovernanceToday, we are pleased to announce that IBM has acquired CrossIdeas, an innovative provider of...
Mainframe June 25, 2014 Security Is a Team Sport: A Case for Cooperative Defense in Depth 3 min read - A strong defense against advanced persistent threats relies on cooperative Defense in Depth.
Banking & Finance June 9, 2014 ZeuS.Maple Variant Targets Canadian Online Banking Customers 5 min read - Trusteer security research team identified a series of attacks carried out by a new ZeuS.Maple variant that targets customers of leading Canadian banks.
X-Force June 9, 2014 Underestimating Your Security Tactics? Attackers Won’t! 4 min read - IBM X-Force report reveals the latest challenges faced by security researchers on the front lines and how attackers are recycling old spam techniques.
Intelligence & Analytics May 30, 2014 IDC Data Shows IBM Security Outpacing the Market 2 min read - Recent IDC data shows that IBM Security gained share, maintained leadership positions and dramatically outpaced the overall security software market.
Intelligence & Analytics May 22, 2014 Blurred Vision: The Case for Security Intelligence 4 min read - Successfully detecting insider fraud and advanced threats requires gathering and analyzing a broad collection of IT security information. An effective security intelligence platform helps organizations filter through the billions of daily log source events and network flows to find the…