Risk Management May 5, 2017 The Competing Claims of Security Vendors Sow Customer Distrust 3 min read - There is no such thing as a magic bullet for security. When security vendors push their products too hard, customers grow skeptical of the entire industry.
April 24, 2017 IBM BigFix: Keeping Innovation and Trust at the Forefront of Everything We Do 2 min read - In accordance with IBM's core values, the BigFix community emphasizes and embodies trust and personal responsibility in all relationships.
Intelligence & Analytics April 19, 2017 Surfing the Tsunami of Threat Data With Cognitive Security 2 min read - Nowadays, most organizations' networks are under constant attack. Cognitive security is the key to locating IoCs within the tsunami of threat intelligence.
Risk Management April 18, 2017 It Is Time to Get Serious About Security Theater 2 min read - Sometimes, the value of peace of mind outweighs the cost of solutions that merely create an illusion of security, also known as security theater.
April 4, 2017 Security Tools Must Adapt to Fileless, Nonmalware Attacks 2 min read - An attack doesn't need a special file to be malicious; it can use previously existing system structures, prompting the need for new security tools.
Security Services March 8, 2017 Information Overload — Now What? 3 min read - Too many security solutions can generate information overload, but a unified managed security services solution can help IT teams reduce the noise.
Application Security September 15, 2015 How Can Your Organization Benefit from Application Security Testing on Cloud? 4 min read - Organizations should consider application security testing in the cloud to considerably extend their data protection at an affordable cost.
X-Force May 22, 2015 When Vendor Security Vulnerabilities Become Your Own 3 min read - Vendor security vulnerabilities can quickly become a major problem for your business, and it's up to you to minimize the risks involved.
Data Protection December 3, 2013 3 Ways to Steal Corporate Credentials 3 min read - Between key-logging malware, phishing schemes and e-commerce sites, there are many ways cyber criminals can steal corporate credentials and commit fraud.
Malware September 24, 2013 Keep It Simple, Stupid: The Zeus Version 3 min read - According to IBM's Amit Klein, organizations protected against malware variants like Zeus are forcing cyber criminals to revert to simpler hacking methods.