Threat Intelligence January 8, 2018 Six Major Data Breach Trends From 2017 9 min read - IBM X-Force monitored major data breach trends throughout 2017 and gleaned key insights to help companies avoid headline-grabbing security incidents.
Data Protection December 28, 2017 ADS-B and Aviation Cybersecurity: Should Passengers Be Concerned? 3 min read - ADS-B technology supplements pilots' situational awareness and provides valuable weather data, but it remains to be seen whether it will impact aviation cybersecurity and passengers' data privacy.
Network December 26, 2017 Now Trending: Your 2018 Network Security Snapshot 3 min read - The top network security trends for security professionals to monitor in 2018 include the evolution of AI, cryptocurrency crime, serverless apps, digital twins, the IoT and more.
Incident Response December 18, 2017 Looking Ahead: Three Bold Cybersecurity Predictions for 2018 2 min read - As we wrap up one of the wildest years the industry has ever seen, the IBM Resilient team offered three bold cybersecurity predictions for 2018.
X-Force December 14, 2017 New Year, New Threats: Five Security Predictions That Will Take Hold in 2018 3 min read - The IBM Security X-Force team offered some security predictions for new trends in the technology landscape and threats that are poised to emerge in 2018.
Risk Management December 11, 2017 Revisiting the Top Security Threats of 2017 3 min read - Many of the security threats we noted at the start of 2017 gripped the public's attention during the past year, foreshadowing major shifts to come in 2018.
Endpoint November 30, 2017 Securing Mobile Transactions and Payments in the Age of Connected Devices 2 min read - Simple security best practices can go a long way toward securing mobile transactions and payments for both consumers and service providers.
Endpoint November 29, 2017 Moving Target Defense: A Digital Shell Game 3 min read - Moving target defense constantly shifts the environment surrounding sensitive data, making it harder for would-be attackers to identify vulnerabilities.
Application Security November 28, 2017 How Israel Became the Land of Connected Car Research and Development 2 min read - With its many manufacturer-sponsored test labs, smart car startups and military imperatives, Israel is becoming a major hub for connected car research.
Endpoint November 27, 2017 IoT Security: The Cold, Hard Truth About Digital Device Defense 3 min read - Is better digital device defense possible, or is securing the Internet of Things (IoT) an impossible task?