Tag: IBM

Taking on a Zero Day with Intelligence

The situation described here does not come from the ivory tower; instead it comes from the real world and shows how to rapidly and efficiently address a zero-day vulnerability. You are probably already overwhelmed with patching. Alternatively, you...

Four Essential Layers to Protect Against Advanced Threats

IBM's strategy around advanced threat protection and how the recent Trusteer acquisition adds a critical component for approaching the challenges associated with more sophisticated attackers and the designer malware they frequently employ during...

IBM Announces Intention to Acquire Trusteer

Attackers are becoming more sophisticated and their malware more difficult to detect and block. New solutions are needed. Today, IBM is announcing the acquisition of Trusteer, a leader in combatting web fraud and the defense against advanced...