About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Filter by
Filter by
- Content Format
- Content Type
Filter by
1 – 30 of 466 items
[]
466 results 25 March 2025
Explainer
What are Digital Credentials?
Digital credentials are a secure way to verify an identity without paper credentials. Examples include digital badges and digital certificates.
Digital credentials

25 March 2025
Insights
Why Social Engineering Still Works
Social engineering will always be a problem, but we can all do our part to make scammers' jobs harder.
Social engineering

17 March 2025
Explainer
What Is Privilege Escalation?
Privilege escalation is a cyberattack technique in which a threat actor alters or elevates their permissions in a target system.
Privileged access management

14 March 2025
Explainer
What is Biometric Authentication?
Biometric authentication uses physical features—like facial features, iris scans or fingerprints—to verify peoples' identities.
Biometric authentication

11 March 2025
Explainer
What is Threat Intelligence?
Threat intelligence is detailed, actionable threat information for preventing and fighting cyberthreats targeting an organization.
Threat intelligence

28 February 2025
Explainer
What is Customer Identity and Access Management (CIAM)?
Customer identity and access management (CIAM) manages the digital identities of customers and other external end users.
Consumer identity and access management

21 February 2025
Explainer
What is The Common Vulnerability Scoring System (CVSS)?
The Common Vulnerability Scoring System (CVSS) is a widely used framework for classifying and rating software vulnerabilities.
Vulnerability scoring

18 February 2025
Explainer
What is Digital Identity?
A digital identity is a profile tied to a specific user, machine or other entity in an IT ecosystem. Digital IDs help track activity and stop cyberattacks.
Digital identity

04 February 2025
News
DeepSeek's rise prompts essential security dialogue
Chinese AI startup DeepSeek is emerging as a competitive player in the generative AI space, but security experts are raising concerns about potential vulnerabilities in its platform. Here's what you need to know.
AI security

27 January 2025
Explainer
What Is Tokenization?
Tokenization converts sensitive data into a nonsensitive digital replacement that maps back to the original in order to protect sensitive information.
Tokenization

23 January 2025
Explainer
What Is ASPM?
ASPM is a cybersecurity approach that focuses on safeguarding applications against security threats throughout the application lifecycle.
Application security

17 January 2025
Explainer
Data Sovereignty vs. Data Residency
Data sovereignty determines who has authority over data. Data residency refers to the geographical location of data.
Data security

07 January 2025
Explainer
What Is Threat Hunting?
Threat hunting is a proactive approach to identifying previously unknown and ongoing threats in an organization's network.
Threat hunting

06 January 2025
Explainer
What Is Data Detection and Response (DDR)?
Data detection and response (DDR) is a cybersecurity technology that monitors and protects data in any format and location across multicloud environments.
Data detection and response

30 December 2024
News
DHS: Guidance for AI in critical infrastructure
At the end of 2024, we've reached a moment in AI development where government involvement can help shape the trajectory of this pervasive technology.
AI security

26 December 2024
News
Apple Intelligence raises stakes in privacy and security
Apple Intelligence promises unparalleled convenience and personalization — while also highlighting the inherent risks of entrusting critical processes to AI.
AI security

23 December 2024
News
FYSA – Adobe Cold Fusion Path Traversal Vulnerability
Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure.
Security vulnerabilities

23 December 2024
Explainer
Ransomware attack on Rhode Island health system exposes data of hundreds of thousands
Rhode Island ransomware attack exposes residents' personal data from Medicaid and SNAP. Discover the breach's impact and recovery steps.
Ransomware

17 December 2024
Explainer
What is Secrets Management?
Secrets management is the protection of credentials—including certificates, passwords and tokens—for nonhuman users, such as apps, servers and workloads.
Secrets management

16 December 2024
News
FBI, CISA issue warning for cross Apple-Android texting
CISA and the FBI announced that a cyber espionage campaign from the People's Republic of China is targeting commercial telecommunications infrastructure.
Mobile security

13 December 2024
Insights
Making smart cybersecurity spending decisions in 2025
With cybersecurity a top focus for many businesses in 2025, cybersecurity is likely to be a top-line item on many budgets heading into the New Year.
Cybersecurity

12 December 2024
Explainer
What is CNAPP (Cloud-Native Application Protection Platform)?
A cloud-native application protection platform (CNAPP) is comprehensive cybersecurity software that integrates cloud security solutions (CIEM, CWPP, CSPM) into a single, unified platform.
CNAPP

12 December 2024
Insights
Security roundup: Top AI stories in 2024
With the AI landscape rapidly evolving, it's worth looking back before moving forward. These are our top five AI security stories for 2024.
AI security

11 December 2024
Insights
Why identity threat detection and response matters: 5 key risks
Identity threat detection and response are designed to detect these five types of identity-based risks that SIEM and UBA often fail to address.
Identity and access management

10 December 2024
Explainer
What Is Data Poisoning?
Data poisoning occurs when threat actors manipulate or corrupt the training data used to develop artificial intelligence (AI) and machine learning (ML) models.
Data poisoning

09 December 2024
Insights
How I got started: Incident responder
What is it about being an incident responder that makes people want to step up for this crucial cybersecurity role? IBM's Dave Bales shares his insights.
Incident response

09 December 2024
Explainer
What Is Security Posture?
Security posture is an indicator of an organization’s security status. Its strength is determined by the security controls and security policies in place.
Security posture

09 December 2024
News
Zero-day exploits underscore rising risks for internet-facing interfaces
The surge in attacks on internet-facing management interfaces such as Palo Alto Networks' Next-Generation Firewalls highlights an evolving threat landscape.
Zero-day

06 December 2024
Insights
How TikTok is reframing cybersecurity efforts
From HackerOne's Global Bug Bounty to a few of TikTok's top cybersecurity creators, you may be surprised by how the app is promoting cybersecurity.
Cybersecurity

04 December 2024
Insights
Cloud threat report: Possible trend in cloud credential "oversaturation"
The cost of stolen cloud credentials on the dark web has steadily decreased since 2022. Have cyber criminals finally oversaturated the market?
Cloud security
