You searched for IBM Security | SC Media

Your search for IBM Security returned 7 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Network Security remove
Last 2 years remove

Your search for IBM Security returned 7 results

Sort Results:

Relevant Recent
Featured, Health Care, Network Security, Ransomware, Security News

Lessons from the ransomware death: Prioritize cyber emergency preparedness

For medical facilities, and any entity that delivers critical services, the situation places security teams on high alert: ensure adequate training for the workforce and some means of network redundancy or else risk similar tragedy or even potential liability.
Coronavirus

Virtual panel: How supply chains can survive COVID-19’s cyber impact

COVID-19 has changed virtually every aspect of how business is done – and the global supply chain has not been spared. Indeed, companies have been rapidly overhauling their manufacturing, warehousing and distribution operations to produce and deliver life-sustaining goods to meet high demands for food, drugs and medical supplies. But eyes keenly focused on the…
Network Security, Podcasts, Security News

This woman who delivered flowers to your office was a hacker. Did you let her in?

SC Media Podcast She may have cheerfully strolled into your company’s reception area holding a gift basket and a USB drive with a special message from the sender. Or she may have sent you an email claiming she’s a college student interested in an internship program. Did you plug in that USB drive? Did you…
Cybercrime, Malware, Mobile Security, Network Security, Retail, Security News

Magecart card-skimming group targets L7 routers used by high-traffic locales

A prominent Magecart cybercriminal group appears to be testing card-skimming code capable of compromising commercial-grade layer 7 (L7) routers used by airports, casinos, hotels and resorts, researchers are reporting. The threat actor, deemed Magecart Group 5 or MG5, has seemingly also experimented with injecting code into a popular open-source mobile app code. Such an attack…
Next post in Security News