About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Application Security
June 25, 2019
Why Doxing Is the Dr. Jekyll and Mr. Hyde of Cloud Security
4 min read - It's time for cloud security teams to turn the tables on malicious actors and use doxing — in the form of attacker reconnaissance — to uncover vulnerabilities before they turn into full-blown threats.
Risk Management
June 12, 2019
From the Streets to the SOC: 3 Risk Assessment Potholes to Avoid in the Enterprise
6 min read - While risk assessment is a regular topic of conversation today, when it comes to practicing good risk estimations and decisions in our daily lives, humans have some serious shortcomings.