Mainframe February 3, 2015 Infrastructure Protection for the Threats of Today and Tomorrow 3 min read - The Infrastructure Protection track at InterConnect will feature insights from the IBM X-Force Research and Development team and customer success stories.
Application Security January 30, 2015 Strengthen Application and Data Security Skills by Day, Celebrate With Aerosmith by Night at IBM InterConnect 3 min read - Learn best practices to improve your organization's risk management and maximize mobile and cloud security at IBM InterConnect 2015.
Endpoint January 29, 2015 Announcing MaaS360 Mobile Threat Management: The Next Layer in Mobile Security 2 min read - In order to combat increasing attacks on mobile devices, IBM has introduced MaaS360 Mobile Threat Management to keep organizations safe.
Identity & Access January 28, 2015 Identity Governance: IBM Security Is a Leader, Again, in the New 2015 Gartner IGA Magic Quadrant 2 min read - IBM Security has made its way back into the Leaders quadrant in the newly published Magic Quadrant for Identity Governance and Administration.
Application Security January 15, 2015 IBM Recognized as a ‘Leader’ in Analyst Report for Application Security Technologies 2 min read - IBM was recently positioned as a "Leader" in a report analyzing service providers' static, dynamic and interactive application security technologies.
Cloud Security January 13, 2015 How IBM’s Patent Leadership Translates to the Future of Cloud Security 2 min read - Inventing new approaches and coming up with sophisticated innovations will be key for organizations looking to develop cloud security strategies.
CISO December 23, 2014 Failure to Plan Is a Plan for Failure When It Comes to Security 3 min read - With major security events happening in 2014, including Heartbleed and Sony's hack, what can companies do to plan ahead and protect themselves from hacks.
CISO December 16, 2014 Top Four Actions for Security Leaders to Take in 2015 3 min read - The perils facing an organization continue to grow in volume, complexity and sophistication, which makes the role of security leaders even more vital.
CISO November 19, 2014 Top 5 Security Actions Every CEO Should Take 4 min read - A CEO should follow these five security principles in order to keep enterprises safe from potential threats and security breaches.
X-Force November 17, 2014 IoT: Will Ubiquitous Connectivity Mean Less Security? 3 min read - The fourth edition of the 2014 IBM X-Force Threat Intelligence Quarterly focuses on security threats that could arise from the Internet of Things (IoT).