You searched for IBM Security | SC Media

Your search for IBM Security returned 6 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Editorial Webcasts remove

Your search for IBM Security returned 6 results

Sort Results:

Relevant Recent
Insider threats
Editorial Webcasts

Insider threats

With the economy flailing still, the threat of seemingly trusted insiders exposing or stealing critical data is more intense than ever. In addition, to a disgruntled worker recently having been laid off maliciously exposing sensitive information, there is also the lure of quick money to be made by acting on behalf of cyber thieves to steal certain bits of customer data.
Harnessing Big Data for protection
Editorial Webcasts

Harnessing Big Data for protection

By leveraging the terabytes of information and data feeds that too frequently overwhelm organizations' security departments, cyber criminals already have gained entry into many an organization's network, exfiltrating critical data that likely could bring victimized entities to their knees. Many executive leaders still have yet to implement the best practices, strategies, policies and tools that could help their enterprises. Indeed, some still try to make sense of anomalous behavior happening on their networks with too few resources, little internal expertise and no increases in funding. On top of this, the amount of critical data itself is accumulating exponentially. But, no doubt, Big Data is here to stay and the many issues surrounding its security and how to harness it to address risk management needs are only growing. We explore the relevant problems around safeguarding some data and enlisting segments of other data to thwart today's bad guys, providing practical steps on how to embrace Big Data of all types and how well-thought-out strategies can enrich existing security programs.
Harnessing Big Data for protection
Editorial Webcasts

Fighting APTs

With simple viruses and Trojans were all the rage, life was simpler for the average CSO. Now, threats of all types abound and the methods cyber attackers enlist to infiltrate networks have only become more varied, often a bit more sophisticated and most assuredly more frequent. One of the most problematic has proven to be APTs.
Cyberespionage: Myth versus reality
Editorial Webcasts

SC Magazine 20/20: Repelling intruders

Increasingly, attackers are having success by targeting weaknesses within client-oriented applications, exploiting these weaknesses through corrupted web sites and malicious content.IBM's Jack Danahy reviews some of the newer threats over the last several months and discusses ways to mitigate against them.
SC Magazine 20/20: Different day, same story
Editorial Webcasts

SC Magazine 20/20: Different day, same story

Weaknesses in the software and applications used by corporations are the prime source for hackers to breach infrastructures, steal choice critical data and turn a profit in the sale or use of it. The exploitation of vulnerabilities that crop up because of corrupted websites or malicious content isn't new, but there are various ways to confront the problems.
Harnessing Big Data for protection
Editorial Webcasts

Mobile and cloud: The Big Data security conundrum

Back when mainframes ruled the corporate computing environment it was far easier to manage critical data. After all, most folks used "dumb" terminals. However, distributed computing quickly made its way into the enterprise, so now, computers with more storage power than ever have become commonplace. Data, as a result, has become widely distributed. And, with the rapid adoption of cloud computing, that data is even more widely distributed - and a challenge to control. The explosion in mobile device use, too, has introduced more stored data. Given the swiftness of these changes and the seeming ubiquitous reliance on cloud storage and myriad mobile devices, just how can all this data be controlled and secured? We learn more.
Next post in Editorial Webcasts