Smartphones, tablets and cloud computing have been leading the way in the workplace until now, but the growing popularity of the internet of things could totally change the look of IT infrastructure.
With the realization that "we're all in this together," boards want to learn how their organizations are collaborating with the rest of the ecosystem in planning and testing cyber resilience.
More than 100 unique exploits of a WinRAR bug have been identified since security researchers discovered a 19-year-old vulnerability in the file compression system.
Starting a new job in the CISO role can feel overwhelming. But the time for security to be seen as a key player — and to have a major business impact — has never been better.
Strong collaboration between IT and OT is a critical step in improving the security of critical infrastructure systems.
Compliance with various regulations and cloud security requirements has expanded as technology and cloud uptake advance, leaving organizations with a challenging conundrum to solve.
IT automation is the future of security programs, but it's not simply plug-and-play. SOC leaders must implement this technology thoughtfully to unlock the full range of benefits.
A hot desking strategy allows employees to sit wherever they want, creating more flexibility for workers and more complexity for IT managers.
The Next Generation of Identity and Access GovernanceToday, we are pleased to announce that IBM has acquired CrossIdeas, an innovative provider of...