Tag: IBM

Cloud Security in the Covert Cloud

There is a troubling model of cloud computing that many businesses have not yet formally acknowledged, and cloud security is especially crucial here.

The ABCs of IAM Security

Traditional IAM solutions are no longer enough to secure your firm's network and information; today's ever-evolving threats require advanced tools.

Taking on a Zero Day with Intelligence

The situation described here does not come from the ivory tower; instead it comes from the real world and shows how to rapidly and efficiently address a zero-day vulnerability. You are probably already overwhelmed with patching. Alternatively, you...

Four Essential Layers to Protect Against Advanced Threats

IBM's strategy around advanced threat protection and how the recent Trusteer acquisition adds a critical component for approaching the challenges associated with more sophisticated attackers and the designer malware they frequently employ during...

IBM Announces Intention to Acquire Trusteer

Attackers are becoming more sophisticated and their malware more difficult to detect and block. New solutions are needed. Today, IBM is announcing the acquisition of Trusteer, a leader in combatting web fraud and the defense against advanced...