Advertisement
Top

Tag: IBM


Cloud security, Vulnerabilities

Apache, IBM Patch Critical Cloud Vulnerability

July 25, 2018

Via: Threat Post

Apache and IBM have patched a critical vulnerability that allows attackers to replace a company’s serverless code with their own malicious script. Once running, the bad code could then be used for a range of nefarious tasks, including extracting confidential […]


Network security, Security, Tech

Mark Your Calendar for the Top Security Conferences of 2018

December 19, 2017

Via: Security Intelligence

Security conferences offer great opportunities to learn about the latest innovations and trends in the industry. They allow practitioners to interact directly with vendors and to network with their peers, putting a human spin on the technology-driven, often impersonal business […]


Cyber warfare

IBM Brings Watson Cognitive Computing To The SOC

February 14, 2017

Via: Dark Reading

Technology known for a Jeopardy stunt six years ago is now powering question answering within IBM Security’s QRadar system. IBM hopes to elevate artificial intelligence and cognitive computing way beyond party tricks and game show supremacy and as a part […]


Mobile security

IBM MaaS360 Enters the Mix on the IBM Security App Exchange

May 10, 2016

Via: Security Intelligence

Conventional IT management calls for a means to visualize all activity, from the network and data center to the cloud, devices, users, apps and everything between. Without a security information and event management (SIEM) solution such as IBM QRadar, this […]


Application security

Got WordPress? PHP C99 Webshell Attacks Increasing

April 15, 2016

Via: Security Intelligence

IBM Security is always looking for high-volume anomalies that might signify a new attack trend. One example is webshells, which are scripts (such as PHP, ASPX, etc.) that perform as a control panel graphical user interface (GUI). An attacker could […]


Vulnerabilities

IBM X-Force finds multiple IoT security risks in smart buildings

February 15, 2016

Via: Tech Republic

According to Gartner, “connected things” in smart homes and smart buildings represent 45% of 1.1 billion IoT devices in 2015. For that many devices, it is disconcerting that security pundits are asking whether these “connected things” are secure. However, it’s […]


Application security

Custom and Open-Source Code: A New Approach to Application Security Management

February 5, 2016

Via: Security Intelligence

Software applications access many of the most important assets organizations manage, such as intellectual property, strategic plans and customer data. This makes them a very lucrative target for cyber-criminals. Unfortunately, applications are often the weakest link in the enterprise IT […]


Cloud security, Privacy protection

IBM cloud tool enables privacy-preserving user authentication

November 26, 2015

Via: Help Net Security

Identity Mixer, a new tool to protect a consumer’s personally identifiable information, is now generally available on IBM Cloud. The tool is built on years of cryptography research, and holds the key to helping to reduce identity theft happening as […]


Malware

IBM: CoreBot malware – simple but dangerous info stealer

September 3, 2015

Via: malware

IBM’s X-Force research team has uncovered a new piece of data-swiping malware whose modular design allows it to be quickly altered and made even more dangerous. CoreBot’s main threat is its ability to steal passwords stored in the endpoint’s browser […]


Cloud security

IBM extends Spectrum storage line into the cloud

August 26, 2015

Via: cloud-security

#ibm is beefing up its offerings in software-defined #storage, which promises to let IT departments better deal with large amounts of storage by uncoupling the management software from its underlying hardware. The company has expanded two products in its #spectrum […]


Threats & Malware

IBM brings cyber threat analytics to the cloud

April 23, 2015

Via: threats-and-malware

#ibm announced at RSA Conference 2015 it is bringing its Security Intelligence technology, IBM QRadar, to the cloud, giving companies the ability quickly prioritize real threats and free up critical resources to fight cyberattacks. The new services are available to […]


Threats & Malware

IBM opens up its threat data as part of new security intelligence sharing platform

April 16, 2015

Via: threats-and-malware

#ibm has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public organizations, researchers and other #network defenders. On Thursday, the company opened up over 700 terabytes of #data about vulnerabilities, attacks […]