October 14, 2015 Application Attacks Strike Nearly 80 Percent of Enterprise Cloud Users 2 min read - Cybercriminals are turning to application attacks to strike against enterprises using the cloud, but these organizations aren't the only ones at risk.
Application Security October 14, 2015 A Lever to Move the World: Automating Application Security Testing in the Cloud 3 min read - Automation is your lever and the cloud is your fulcrum — which enable you to move forward into the application security testing world.
Cloud Security October 6, 2015 AT&T and IBM Mobile Cloud Security Set to Scale Work Anywhere 2 min read - IBM is set to join the stage at this year's 17th Annual AT&T Cybersecurity Conference to announce the AT&T and IBM mobile cloud security solution.
Cloud Security September 25, 2015 Lines of Business, Cloud-Based Apps and the Implications of Shadow IT 2 min read - When the lines of business within an enterprise create a culture of shadow IT, it can have far-reaching consequences for the organization as a whole.
Endpoint September 18, 2015 FedRAMP Turbocharges Smooth Entry Into Cloud Services for Government Mobility 4 min read - Jeff Ward, the federal sales leader for IBM MaaS360, talked about enterprise mobility management and cloud services adoption in government.
Cloud Security September 14, 2015 Security’s Imminent Game Changer: The Cloud Hits a Walk-Off 3 min read - Maintaining enterprise security requires a game-changing evolution of cloud and mobile security capabilities — and the technologies used to manage them.
CISO September 11, 2015 Securing the Nonprofit 3 min read - Nonprofits and NGOs face a particular challenge when it comes to securing their critical data and forming their security infrastructure.
Software Vulnerabilities September 10, 2015 The Security and Privacy of Wearable Health and Fitness Devices 4 min read - Health and fitness devices that are connected to the Internet of Things can improve quality of life, but they also have security and privacy risks.
X-Force September 4, 2015 Side-Channel Attacks Against Multicore Processors in Cross-VM Scenarios: Part III 3 min read - In the final installment of this series, we focus on S$A attacks as well as some ways your organization can prevent side-channel attacks on its VMs.
X-Force August 28, 2015 Side-Channel Attacks Against Multicore Processors in Cross-VM Scenarios: Part II 6 min read - Discussion of two side-channel attacks meant to retrieve sensitive information from a virtual machine (VM) on the same physical processor package.