Application Security May 7, 2019 Putting the ‘S’ in IoT: How to Make Internet of Things Solutions Secure by Design 5 min read - When developing and deploying internet of things solutions, achieving security by design is not as simple as picking a secure development life cycle (SDLC) framework and shifting your security left.
Energy & Utility April 25, 2019 Industrial Control Systems Security: To Test or Not to Test? 6 min read - According to X-Force Red data, the number of vulnerabilities exposing industrial control systems has increased 83 percent since 2011. Should organizations test them and risk destabilizing operations?
CISO April 5, 2019 Preparing for the CCPA: Leverage GDPR Investments to Accelerate Readiness 5 min read - To prepare for the CCPA and other upcoming data privacy regulations, start by applying the best practices and frameworks you used to achieve GDPR readiness when the regulation took effect last May.
CISO March 27, 2019 Here’s What You Need to Know to Secure Your IoT Projects 4 min read - Securing IoT projects requires a thorough understanding of your technology infrastructure, its services and components, and how they relate to each other.
Application Security March 20, 2019 Creating Meaningful Diversity of Thought in the Cybersecurity Workforce 4 min read - Let's add the diversity of approach, diversity of values and advocacy for deep customer empathy to the cybersecurity workforce diversity we are building.
Application Security February 7, 2019 Moving to the Hybrid Cloud? Make Sure It’s Secure by Design 4 min read - Failure to consider security when developing a hybrid cloud can lead to unanticipated problems that don't exist in typical technology infrastructure.
Banking & Finance August 29, 2018 It’s Time for Cryptocurrency Security to Catch Up With Investor Expansion 3 min read - Regulators and digital coin exchanges should build robust cryptocurrency security into their systems to protect themselves and individual investors from theft and fraud.
CISO December 29, 2017 Transform Your Security Strategy to Avoid Digital Roadblocks 3 min read - To transform your security strategy, you must first establish a model of shared responsibility between security professionals and business units throughout the organization.
Data Protection October 27, 2017 The Blockchain Is Only as Strong as Its Weakest Link 3 min read - Blockchain technology depends on mutual trust between human participants, each of whom represents a potential weakness in the chain.
Data Protection October 2, 2017 How We Developed the IBM Security GDPR Framework 4 min read - IBM Security developed a five-phase GDPR framework to help organizations achieve and maintain compliance with the upcoming privacy law.