You searched for IBM Security | SC Media

Your search for IBM Security returned 158 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Network Security remove

Your search for IBM Security returned 158 results

Sort Results:

Relevant Recent
Featured, Health Care, Network Security, Ransomware, Security News

Lessons from the ransomware death: Prioritize cyber emergency preparedness

For medical facilities, and any entity that delivers critical services, the situation places security teams on high alert: ensure adequate training for the workforce and some means of network redundancy or else risk similar tragedy or even potential liability.
Coronavirus

Virtual panel: How supply chains can survive COVID-19’s cyber impact

COVID-19 has changed virtually every aspect of how business is done – and the global supply chain has not been spared. Indeed, companies have been rapidly overhauling their manufacturing, warehousing and distribution operations to produce and deliver life-sustaining goods to meet high demands for food, drugs and medical supplies. But eyes keenly focused on the…
Network Security, Podcasts, Security News

This woman who delivered flowers to your office was a hacker. Did you let her in?

SC Media Podcast She may have cheerfully strolled into your company’s reception area holding a gift basket and a USB drive with a special message from the sender. Or she may have sent you an email claiming she’s a college student interested in an internship program. Did you plug in that USB drive? Did you…
Cybercrime, Malware, Mobile Security, Network Security, Retail, Security News

Magecart card-skimming group targets L7 routers used by high-traffic locales

A prominent Magecart cybercriminal group appears to be testing card-skimming code capable of compromising commercial-grade layer 7 (L7) routers used by airports, casinos, hotels and resorts, researchers are reporting. The threat actor, deemed Magecart Group 5 or MG5, has seemingly also experimented with injecting code into a popular open-source mobile app code. Such an attack…
Network Security, Security News, Vulnerabilities

Flaws in visitor management systems could roll out welcome mat for attackers

Five kiosk-based visitor management systems designed to securely check guests into business facilities or industrial buildings were found to contain vulnerabilities that could potentially allow attackers to physically intrude into spaces, break into private networks or steal information. Normally, these systems automate the authentication of visitors and provision them with security badges (potentially RFID-enabled) for…
Cloud Security, Security News, Vulnerabilities

IBM updates firmware to fix flaw in cloud server’s BMC component

A vulnerability found in the Baseboard Management Controller (BMC) component of IBM Cloud’s Bare Metal Server product could allow attackers to overwrite the firmware and then leverage the compromised firmware to attack future users of the product. IBM has issued a firmware update to patch the flaw, which the company’s PSIRT team classified as low…
Government, Network Security, Security News, Vulnerabilities

Report: NIST to use IBM’s Watson AI system to score vulnerabilities

The U.S. National Institute of Standards and Technology (NIST) reportedly plans to replace its method of scoring publicly disclosed vulnerabilities with a new automated process leveraging IBM’s Watson artificial intelligence system. The agency expects Watson to supplant its current Common Vulnerability Scoring System (CVSS) process for most bugs by October 2019, according to a report…
Next post in Government