Major vulnerabilities as the new norm. What can you do to protect your business against incidents like Shellshock and Heartbleed?
The Bash bug, a new vulnerability known as Shellshock, could have a sizable impact on an untold number of devices, according to security experts.
Asset management can be improved when responsibilities are shared and the inventory system is established, frequently updated and quickly actionable.
Privacy is a significant concern in the Internet of Things. It is already changing the security landscape and exponentially expanding the attack surface.
The latest IBM X-Force Threat Intelligence Report discusses the aftermath of the Heartbleed vulnerability, what organizations can learn and improve upon.
The chaos of Black Hat is just like the chaos of the information security industry. How can one decide which security company to partner with?
Black Hat 2014 illuminated the vulnerabilities of the Internet of Things, according to two IBM researchers who attended the conference.
Blackphone offers a robust security and privacy suite, which is handy for sophisticated users but not a complete solution for all mobile users.
The IBM Security X-Force Research team has uncovered a serious vulnerability that affects many Android applications built on the Apache Cordova platform.
When selecting an Information Technology (IT) vendor, it is important to consider what the vendor does to mitigate security vulnerabilities.