Software Vulnerabilities February 11, 2015 A Perfect Match: Uniting Mobile Security With Your Employees’ Use of Online Dating Apps 5 min read - A new IBM report details potential vulnerabilities in many popular dating apps that could negatively affect your organization's mobile security.
Endpoint February 10, 2015 Mobile Threats Underline Mobile Security Challenges 2 min read - Recent mobile security vulnerabilities faced by Verizon and AT&T point to the scope and variety of mobile threats and how firms are responding to them.
Software Vulnerabilities October 16, 2014 Heartbleed and Shellshock: The New Norm in Vulnerabilities 6 min read - Major vulnerabilities as the new norm. What can you do to protect your business against incidents like Shellshock and Heartbleed?
September 26, 2014 Shellshock: Where the Bash Bug Could Hit the Hardest 2 min read - The Bash bug, a new vulnerability known as Shellshock, could have a sizable impact on an untold number of devices, according to security experts.
Risk Management September 23, 2014 How to Improve Asset Management for Risk Assessment and Control 2 min read - Asset management can be improved when responsibilities are shared and the inventory system is established, frequently updated and quickly actionable.
Intelligence & Analytics September 17, 2014 How the Internet of Things (IoT) Is Changing the Cybersecurity Landscape 3 min read - Privacy is a significant concern in the Internet of Things. It is already changing the security landscape and exponentially expanding the attack surface.
X-Force August 25, 2014 Why Heartbleed Still Matters: Hindsight in the Age of Pervasive Exploits 4 min read - The latest IBM X-Force Threat Intelligence Report discusses the aftermath of the Heartbleed vulnerability, what organizations can learn and improve upon.
Intelligence & Analytics August 18, 2014 3 Sure-Fire Tips for Navigating the Chaos of the Information Security Industry 3 min read - The chaos of Black Hat is just like the chaos of the information security industry. How can one decide which security company to partner with?
Intelligence & Analytics August 15, 2014 Black Hat 2014: Where the Internet of Things Meets Reality 4 min read - Black Hat 2014 illuminated the vulnerabilities of the Internet of Things, according to two IBM researchers who attended the conference.
August 13, 2014 Data Security Gets a Wake-Up Call From Blackphone 2 min read - Blackphone offers a robust security and privacy suite, which is handy for sophisticated users but not a complete solution for all mobile users.