Not sure where to distribute IT budgets for ideal returns? Here's a roundup of the top 10 cybersecurity conference trips to make time for this year.
Armed with security analytics tools, organizations can benefit from big data capabilities to analyze data and enhance detection with proactive alerts about potential malicious activity.
A new phone-based phishing scam reveals how fraudsters are devising more sophisticated schemes to prey on Apple device users.
A weaponized document builder service known as LCG Kit added the ability to use Microsoft Word macros to load the necessary shellcode for installing malware.
Microsoft Windows Defender Research discovered an attack campaign that utilized spear phishing emails impersonating U.S. Department of State employees to gain remote access to victims' machines.
A love of the visual arts and a passion for drama brought Allison Ritter to the IBM X-Force Command Center. She channels these passions to create engaging, interactive security lessons for clients.
Analysts discovered a new spear phishing attack campaign from the SNAKEMACKEREL group that uses fake Brexit-related documents to infiltrate major government agencies and steal information.
Most security systems are built with data confidentiality in mind, but effective data privacy will also emphasize integrity and availability.
As you consider the various IT security events happening next year, here are five key reasons why you should attend some of the compelling IBM Security sessions planned at Think 2019.
A security escape room can be a fun and interactive way to train employees on various security concepts they might otherwise ignore.