Risk Management September 23, 2014 How to Improve Asset Management for Risk Assessment and Control 2 min read - Asset management can be improved when responsibilities are shared and the inventory system is established, frequently updated and quickly actionable.
Software Vulnerabilities August 29, 2014 Understanding IE’s New Exploit Mitigations: The Memory Protector and the Isolated Heap 6 min read - In response to two attacks, new Internet Explorer exploit mitigations were released to increase the cost of exploiting IE use-after-free vulnerabilities.
Mainframe August 28, 2014 Intrusion Prevention and the Seven-Year Itch 3 min read - Intrusion prevention technology has had to continuously evolve in the past seven years to meet today's network security needs.
August 28, 2014 Backoff Hacker Tool: Secret Service Warns Target Malware Still Active 3 min read - According to a recent Secret Service and Department of Homeland Security release, the Backoff hacker tool is still alive and well in American POS systems.
X-Force August 25, 2014 Why Heartbleed Still Matters: Hindsight in the Age of Pervasive Exploits 4 min read - The latest IBM X-Force Threat Intelligence Report discusses the aftermath of the Heartbleed vulnerability, what organizations can learn and improve upon.
Software Vulnerabilities August 5, 2014 Apache Cordova Vulnerability Discovered: 10% of Android Banking Apps Potentially Vulnerable 8 min read - The IBM Security X-Force Research team has uncovered a serious vulnerability that affects many Android applications built on the Apache Cordova platform.
Network July 8, 2014 3 Essentials of a Network Security Superhero 2 min read - An effective network security solution should exhibit the qualities of a superhero, exhibiting superhuman intelligence, visibility and control.
Application Security June 24, 2014 So Many Vulnerabilities, So Little Time 5 min read - Getting application security vulnerabilities under control is harder than it sounds. Follow these four steps to help your company get started.
X-Force June 9, 2014 Underestimating Your Security Tactics? Attackers Won’t! 4 min read - IBM X-Force report reveals the latest challenges faced by security researchers on the front lines and how attackers are recycling old spam techniques.
Advanced Threats May 6, 2014 3 Advanced Threat Protection Essentials 5 min read - Today's advanced attacks are more targeted and complex than ever. When it comes to advanced threat protection (ATP), you need an integrated approach.