HackDig : Dig high-quality web security articles for hacker

IBM Experts Weigh In on the Value of an Industry-Focused Approach to Security

To more closely align with the way clients think about security, IBM Security is focused on providing an open security immune system that enables organizations to integrate and leverage the investments they have already made within their specific industry. Experts Discuss the Benefits of an Industry-Focused Security Strategy We consulted six experts from the
Publish At:2017-08-30 20:10 | Read:188 | Comments:0 | Tags:Industries Automotive Industry Cloud Cloud Security Energy a

IDaaS Vendors: IBM Cloud Identity Service Named Market Leader in Six Recent Analyst Reports

Not one, not two, but six of the most recent analyst reports evaluating the major Identity and Access Management-as-a-Service (IDaaS) vendors positioned IBM Cloud Identity Service as an overall market leader in cloud-based identity and access management (IAM). The market is crowded with both startups and large IDaaS vendors, making this is a big win for IBM
Publish At:2017-08-16 09:00 | Read:132 | Comments:0 | Tags:Cloud Security Identity & Access Security Services Cloud Ide

Pervasive Encryption Simplifies Mainframe Security

On July 17, IBM unveiled its z14 mainframe server, which combines the traditional mainframe hardware with new capabilities in areas such as cloud, cognitive, analytics, application management, blockchain, machine learning and more. Most importantly, z14 includes enhanced security features — namely, pervasive encryption — to help clients stay one step ahead
Publish At:2017-08-04 20:10 | Read:795 | Comments:0 | Tags:Data Protection Mainframe Application Security Encryption En

Accelerate Response With Orchestration

Organizations today are battling three compounding challenges: complex cyberattacks that shift as they unfold, complicated technology environments and a fast-growing skills gap. As a result, technologies and processes that enable a dynamic, fast and orchestrated response are becoming vital. IBM Resilient has many enterprise deployments around the world spa
Publish At:2017-07-28 03:30 | Read:253 | Comments:0 | Tags:Incident Response IBM IBM Security Incident Response (IR) Re

Hello, My Name Is Space Rogue

IBM X-Force Red marked its first-year anniversary with the addition of security specialists, including Space Rogue, who increases the team’s impressive roster of talent. Hello, my name is Space Rogue. Well, actually, it’s Cris Thomas, but the security community is most likely to recognize my work over the past two decades under my pseudonym. The
Publish At:2017-07-28 03:30 | Read:316 | Comments:0 | Tags:Application Security Security Services X-Force Research IBM

IBM X-Force Red Turns 1, Expands Into Auto and IoT Practice Areas

Earlier this year, I gave a talk at the RSA Conference about the privacy and security flaws in many of today’s connected cars. The response was nothing short of astounding. As it turns out, people get very nervous when you talk about finding and controlling their cars from a mobile phone. While I didn’t initially set out to find vulnerabilities i
Publish At:2017-07-24 17:25 | Read:129 | Comments:0 | Tags:Application Security Industries Software & App Vulnerabiliti

A ‘Wiper’ in Ransomware Clothing: Global Attacks Intended for Destruction Versus Financial Gain

Co-authored by Steve Stone After finalizing initial analysis, IBM X-Force Incident Response and Intelligence Services (IRIS) concluded that the Petya variant attacks that started on Tuesday, June 27, were intended as destructive attacks against Ukraine, rather than a means for cybercriminals to make money from ransom payouts. In other words, this attack was
Publish At:2017-06-30 03:45 | Read:347 | Comments:0 | Tags:Malware Advanced Attacks Advanced Malware Advanced Threats I

IBM Named a Leader in Inaugural Gartner Magic Quadrant for Access Management, Worldwide

Gartner has named IBM a Leader in its first-ever Magic Quadrant for Access Management, Worldwide. Both IBM Security Access Manager and Cloud Identity Service were evaluated in this new report, alongside 14 other vendors. IBM was placed as a Leader for completeness of vision and ability to execute. IBM Leads the Way in Access Management According to Gartne
Publish At:2017-06-29 09:20 | Read:343 | Comments:0 | Tags:Identity & Access Access Management Cloud Identity Service G

In Case You Missed the Memo: What’s New in IBM’s Application Security Testing?

In the popular office parody “Office Space,” there’s an ongoing joke about a recent memorandum that requires employees to attach cover sheets to their testing procedure specification (TPS) reports when they submit them to management. When fictional corporate executive Bill Lumbergh confronts employee Peter Gibbons at his cubicle to discuss
Publish At:2017-06-28 14:55 | Read:363 | Comments:0 | Tags:Application Security Cloud Security Risk Management Applicat

Petya Weren’t Expecting This: Ransomware Takes Systems Hostage Across the Globe

Early on Tuesday, June 27, reports began to circulate that organizations in the Ukraine and elsewhere in Europe were suffering ransomware attacks. It quickly became clear that this Petya attack could equal or surpass the May WannaCry attack. WannaCry’s spread was so successful because it was powered by a flaw in Windows, and although Microsoft had rele
Publish At:2017-06-27 20:30 | Read:192 | Comments:0 | Tags:Malware Advanced Threats IBM Security IBM X-Force Exchange I

Changing How We Educate and Hire With a New Collar Approach

Earlier this month, I had the privilege to attend the IBM Security Summit in New York. Among the many great presenters and events during the day was a panel discussion on new and better ways to tackle the cybersecurity skills gap facing governments, industries and academia, and how a new collar approach can help. The need for skilled cybersecurity talent i
Publish At:2017-06-15 13:50 | Read:316 | Comments:0 | Tags:CISO Academia Education IBM IBM Security Professional Develo

Bringing Systems Integration Skills to Cybersecurity Degree Students

For the third year, the Warwick Manufacturing Group (WMG) at the University of Warwick will run the Enterprise Cyber Security (ECS) module, which is part of the institution’s Master of Science in Cyber Security and Management program. The individual degree modules offer students a solid set of security skills, culminating with the ECS module, which is
Publish At:2017-06-14 19:25 | Read:464 | Comments:0 | Tags:Data Protection Academia Cybersecurity Cybersecurity Trainin

Digital Transformation Means Infusing Identity Everywhere

Organizations are rapidly adopting new technologies such as cloud, mobile and the Internet of Things (IoT) to facilitate and accelerate digital transformation. Securing these environments means managing identities throughout the organization, and next-generation identity and access management (IAM) strategies must give IT the ability to swiftly enable cloud,
Publish At:2017-06-14 01:00 | Read:449 | Comments:0 | Tags:Cloud Security Identity & Access Access Management Cloud Clo

Embracing the GDPR as a Catalyst for Innovation

The General Data Protection Regulation (GDPR) is designed to govern how organizations manage the personal information of European Union (EU) citizens. Any company that conducts business in Europe or stores data belonging to EU citizens is impacted, no matter where it is based. Organizations that fail to comply by the time the regulation takes effect in May
Publish At:2017-06-05 14:15 | Read:502 | Comments:0 | Tags:CISO Data Protection Compliance Data Privacy General Data Pr

Cisco and IBM Raise Cybersecurity to the Power of Two

In the world of cybercrime, there are very few lone wolves out there plotting and launching major attacks. In fact, cybercriminals collaborate actively with one another, as well as wealthy financial backers within organized crime and nation-states, making cybersecurity ever more challenging. A United Nations study found that crime rings that actively share d
Publish At:2017-05-31 16:50 | Read:426 | Comments:0 | Tags:CISO Cisco Cybersecurity IBM IBM Security Information Sharin

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud