Data Protection March 28, 2019 Let’s Make 2019 the Year of Fewer Records Compromised in Data Breaches 4 min read - A notable takeaway from the report was that despite fewer reported data breaches, 2018 witnessed a 126 percent uptick in the number of records breached containing personally identifiable information.
Application Security June 11, 2018 Why Isn’t Secure DevOps Being Practiced? 4 min read - While chief information officers (CIOs) and leaders understand early testing is key to cost control and risk reduction, few teams are practicing secure DevOps in a way that meaningfully reduces risks.
Cloud Security May 16, 2018 Achieving Cloud Security Through Gray Skies 3 min read - When it comes to cloud security challenges, the issue is one of complexity. Many organizations lack a centralized view of all workloads across all of their environments.
CISO September 5, 2016 Why Should Women in Security Shoot for the Stars? 3 min read - In response to the dearth of women in security, IBM is leading an industrywide push to encourage and enable women to pursue cybersecurity careers.
CISO August 28, 2016 Raising the Profile of Women in Security 3 min read - Despite the shortage of women in security, the barriers to achieving gender equality are coming down as women gain more influence in the industry.
August 10, 2016 Addressing the Diversity Gap in Cybersecurity: Join the IBM-ICMCP Summit in October 2 min read - In an effort to help close the diversity gap in cybersecurity, IBM will be hosting a town hall summit to generate ideas for addressing this challenge.
February 26, 2015 Android Malware Hijacks Phone Shutdown Routine 2 min read - An Android malware tool fakes the phone shutdown process to steal data, demonstrating the threats that accompany downloading apps from third-party stores.
CISO December 25, 2014 Why Startups Should Implement Security From the Outset 3 min read - While resource constraints are the norm for startups and investing in security may seem unattractive, this could be what preserves the business.
CISO December 23, 2014 Failure to Plan Is a Plan for Failure When It Comes to Security 3 min read - With major security events happening in 2014, including Heartbleed and Sony's hack, what can companies do to plan ahead and protect themselves from hacks.
Cloud Security December 1, 2014 CIC Security Briefing Note: IBM Delivers Dynamic Security for Hybrid Cloud 5 min read - Through its new Dynamic Security strategy, IBM is improving its cloud offerings through a unified architecture, platform, security tools and services.