You searched for IBM Security | SC Media

Your search for IBM Security returned 70 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Dan Kaplan remove

Your search for IBM Security returned 70 results

Sort Results:

Relevant Recent
Security News

IBM offers free tools for application security

IBM announced today the availability of free hosted software to help customers and developers better engineer safety into business applications, instead of having to reactively respond to security holes.
Security News

IBM to acquire Consul risk management

IBM today announced plans to acquire audit solutions provider Consul risk management in a move that further boosts the computing giant's security portfolio.
Security News

IBM loses tapes with employee personal info

IBM, which invented magnetic tape storage more than 50 years ago and has since emerged as a leading provider of data encryption, has lost an undisclosed number of backup tapes containing the personal information of employees.
Security News

IBM to acquire ISS for $1.3 billion

Computing giant IBM will acquire information security and service provider Internet Security Systems (ISS) for about $1.3 billion, the two companies announced today.
Security News

IBM buys IT management provider BigFix

IBM on Thursday announced plans to acquire BigFix, an Emeryville, Calif.-based provider of security management solutions. Specifically, BigFix software offers a single IT management platform that allows organizations the ability to manage applications for vulnerabilities, systems lifecycle, configuration and compliance. Terms of the deal were not disclosed, but a Bloomberg report valued the transaction at $400 million. IBM's last security-related acquisition was last fall when it picked up database security firm Guardium for a reported $225 million. — DK
Security News

CA backup and recovery solution contains flaws

Two vulnerabilities were reported today in a CA backup and recovery solution that, if exploited, could allow an attacker to execute remote code and gain unauthorized administrative privileges.
Next post in Security News