Active loading indicator
1 – 30 of 538 items
[]
538 results
25 March 2025
Explainer
What are Digital Credentials?

Digital credentials are a secure way to verify an identity without paper credentials. Examples include digital badges and digital certificates.

Digital credentials
25 March 2025
Insights
Why Social Engineering Still Works

Social engineering will always be a problem, but we can all do our part to make scammers' jobs harder.

Social engineering
17 March 2025
Explainer
What Is Privilege Escalation?

Privilege escalation is a cyberattack technique in which a threat actor alters or elevates their permissions in a target system.

Privileged access management
14 March 2025
Explainer
What is Biometric Authentication?

Biometric authentication uses physical features—like facial features, iris scans or fingerprints—to verify peoples' identities.

Biometric authentication
11 March 2025
Explainer
What is Threat Intelligence?

Threat intelligence is detailed, actionable threat information for preventing and fighting cyberthreats targeting an organization.

Threat intelligence
28 February 2025
Explainer
What is Customer Identity and Access Management (CIAM)?

Customer identity and access management (CIAM) manages the digital identities of customers and other external end users.

Consumer identity and access management
21 February 2025
Explainer
What is The Common Vulnerability Scoring System (CVSS)?

The Common Vulnerability Scoring System (CVSS) is a widely used framework for classifying and rating software vulnerabilities.

Vulnerability scoring
21 February 2025
News
SoaPy: Stealthy enumeration of Active Directory environments through ADWS

Due to modern defensive solutions, targeted and large-scale enumeration of Active Directory (AD) environments has become increasingly detected. Learn more on that and a new tool to help fight it.

Security vulnerabilities
18 February 2025
Explainer
What is Digital Identity?

A digital identity is a profile tied to a specific user, machine or other entity in an IT ecosystem. Digital IDs help track activity and stop cyberattacks.

Digital identity
14 February 2025
News
Smoltalk: RCE in open source agents

Hugging Face announced the release of smolagents, a lightweight framework for building AI agents. However, X-Force discovered a vulnerability and Hugging Face was quick to implement a fix. Learn more.

Security vulnerabilities
14 February 2025
News
4 ways to bring cybersecurity into your community

4 ways to bring cybersecurity into your community | IBM

Cybersecurity
11 February 2025
News
The straight and narrow — How to keep ML and AI training on track

The straight and narrow — How to keep ML and AI training on track | IBM

AI security
07 February 2025
Insights
Will AI threaten the role of human creativity in cyber threat detection?

AI has already automated many repetitive, time-consuming cybersecurity tasks. But will AI threaten the human creativity threat detection depends on?

Threat detection and response
05 February 2025
News
Stress-testing multimodal AI applications is a new frontier for red teams

Stress-testing multimodal AI applications is a new frontier for red teams | IBM

Red teams
04 February 2025
News
DeepSeek's rise prompts essential security dialogue

Chinese AI startup DeepSeek is emerging as a competitive player in the generative AI space, but security experts are raising concerns about potential vulnerabilities in its platform. Here's what you need to know.

AI security
31 January 2025
News
AI decision-making: Where do businesses draw the line?

AI decision-making: Where do businesses draw the line? | IBM

AI security
30 January 2025
News
When ransomware kills: Attacks on healthcare facilities

When ransomware kills: Attacks on healthcare facilities | IBM

Ransomware
29 January 2025
News
AI and cloud vulnerabilities aren’t the only threats facing CISOs today

AI and cloud vulnerabilities aren’t the only threats facing CISOs today | IBM

Vulnerability management
27 January 2025
Explainer
What Is Tokenization?

Tokenization converts sensitive data into a nonsensitive digital replacement that maps back to the original in order to protect sensitive information.

Tokenization
23 January 2025
Explainer
What Is ASPM?

ASPM is a cybersecurity approach that focuses on safeguarding applications against security threats throughout the application lifecycle.

Application security
23 January 2025
News
Taking the fight to the enemy: Cyber persistence strategy gains momentum

Taking the fight to the enemy: Cyber persistence strategy gains momentum | IBM

Cybersecurity
22 January 2025
News
2024 Cloud Threat Landscape Report: How does cloud security fail?

2024 Cloud Threat Landscape Report: How does cloud security fail? | IBM

Cloud security
21 January 2025
News
Are attackers already embedded in U.S. critical infrastructure networks?

Are attackers already embedded in U.S. critical infrastructure networks? | IBM

Infrastructure security
17 January 2025
Explainer
Data Sovereignty vs. Data Residency

Data sovereignty determines who has authority over data. Data residency refers to the geographical location of data.

Data security
16 January 2025
News
The current state of ransomware: Weaponizing disclosure rules and more

The current state of ransomware: Weaponizing disclosure rules and more | IBM

Ransomware
14 January 2025
News
Why do software vendors have such deep access into customer systems?

Why do software vendors have such deep access into customer systems? | IBM

Cybersecurity
07 January 2025
Explainer
What Is Threat Hunting?

Threat hunting is a proactive approach to identifying previously unknown and ongoing threats in an organization's network.

Threat hunting
07 January 2025
Insights
Mobile device security: Why protection is critical in the hybrid workforce

As many organizations transition to hybrid work environments, poorly defended mobile devices offer a rich target for malicious actors.

Mobile security
06 January 2025
News
Abusing MLOps platforms to compromise ML models and enterprise data lakes

With the rush to implement AI across organizations came the increase in the use of MLOps platforms and a greater risk of attack. Learn more about MLOps platforms and how threat actors are using them.

AI security
06 January 2025
Explainer
What Is Data Detection and Response (DDR)?

Data detection and response (DDR) is a cybersecurity technology that monitors and protects data in any format and location across multicloud environments.

Data detection and response
1 – 30 of 538 items