IBM Security has made its way back into the Leaders quadrant in the newly published Magic Quadrant for Identity Governance and Administration.
IBM was recently positioned as a "Leader" in a report analyzing service providers' static, dynamic and interactive application security technologies.
Inventing new approaches and coming up with sophisticated innovations will be key for organizations looking to develop cloud security strategies.
With major security events happening in 2014, including Heartbleed and Sony's hack, what can companies do to plan ahead and protect themselves from hacks.
The perils facing an organization continue to grow in volume, complexity and sophistication, which makes the role of security leaders even more vital.
A CEO should follow these five security principles in order to keep enterprises safe from potential threats and security breaches.
The fourth edition of the 2014 IBM X-Force Threat Intelligence Quarterly focuses on security threats that could arise from the Internet of Things (IoT).
IBM Security Trusteer researchers recently discovered a new Tinba variant exhibiting new, exciting features and making waves in an active malware campaign.
There's no such thing as a "free" app. What data are free mobile apps collecting, how is it used and what can companies do to protect themselves?
The chaos of Black Hat is just like the chaos of the information security industry. How can one decide which security company to partner with?