You searched for IBM Security | SC Media

Your search for IBM Security returned 59 results

Your search for IBM Security returned 59 results

Sort Results:

Relevant Recent
RiskSec 2020, Security News

How to use cybersecurity to accelerate growth

Cybersecurity often – and rightly – has been viewed as a point of friction and a cost center, but more recently organizations are using it to accelerate growth. When considered early on – in everything from design and development through planning and execution – security can help companies lower risk and get applications and services…
SC Congress Canada

Web applications remain a pressing concern

Vulnerabilities in web applications remain the preferred entryway for crooks seeing valuable company information, Rob Lamb, vice president of IBM security products, said Wednesday at SC Congress Canada in Toronto.
Insider threats
Editorial Webcasts

Insider threats

With the economy flailing still, the threat of seemingly trusted insiders exposing or stealing critical data is more intense than ever. In addition, to a disgruntled worker recently having been laid off maliciously exposing sensitive information, there is also the lure of quick money to be made by acting on behalf of cyber thieves to steal certain bits of customer data.
Harnessing Big Data for protection
Editorial Webcasts

Harnessing Big Data for protection

By leveraging the terabytes of information and data feeds that too frequently overwhelm organizations' security departments, cyber criminals already have gained entry into many an organization's network, exfiltrating critical data that likely could bring victimized entities to their knees. Many executive leaders still have yet to implement the best practices, strategies, policies and tools that could help their enterprises. Indeed, some still try to make sense of anomalous behavior happening on their networks with too few resources, little internal expertise and no increases in funding. On top of this, the amount of critical data itself is accumulating exponentially. But, no doubt, Big Data is here to stay and the many issues surrounding its security and how to harness it to address risk management needs are only growing. We explore the relevant problems around safeguarding some data and enlisting segments of other data to thwart today's bad guys, providing practical steps on how to embrace Big Data of all types and how well-thought-out strategies can enrich existing security programs.
2013 SC Magazine US Awards Finalists
Awards

2013 SC Awards US Finalists: Round Two

Round two of categories for the 2013 award finalists include best cloud computing security, fraud prevention solution, multifactor product, web application firewall, and enterprise security solution.
Harnessing Big Data for protection
Editorial Webcasts

Fighting APTs

With simple viruses and Trojans were all the rage, life was simpler for the average CSO. Now, threats of all types abound and the methods cyber attackers enlist to infiltrate networks have only become more varied, often a bit more sophisticated and most assuredly more frequent. One of the most problematic has proven to be APTs.
Cybercrime, Events, Malware, Ransomware, Security News

Destructive malware attacks double as attackers pair ransomware with disk wipers

IBM Security’s X-Force Incident Response and Intelligence Services (IRIS) team reported this week that it witnessed a 200 percent increase in destructive malware attacks over the first half of 2019, compared to the second half of 2018. These malware attacks typically incorporated a disk wiper component to them. Wipers are historically associated with nation-state-sponsored attacks…
Next post in Cybercrime