Cloud security, Vulnerabilities
July 25, 2018
Via: Threat PostApache and IBM have patched a critical vulnerability that allows attackers to replace a company’s serverless code with their own malicious script. Once running, the bad code could then be used for a range of nefarious tasks, including extracting confidential […]
Network security, Security, Tech
December 19, 2017
Via: Security IntelligenceSecurity conferences offer great opportunities to learn about the latest innovations and trends in the industry. They allow practitioners to interact directly with vendors and to network with their peers, putting a human spin on the technology-driven, often impersonal business […]
February 14, 2017
Via: Dark ReadingTechnology known for a Jeopardy stunt six years ago is now powering question answering within IBM Security’s QRadar system. IBM hopes to elevate artificial intelligence and cognitive computing way beyond party tricks and game show supremacy and as a part […]
May 10, 2016
Via: Security IntelligenceConventional IT management calls for a means to visualize all activity, from the network and data center to the cloud, devices, users, apps and everything between. Without a security information and event management (SIEM) solution such as IBM QRadar, this […]
April 15, 2016
Via: Security IntelligenceIBM Security is always looking for high-volume anomalies that might signify a new attack trend. One example is webshells, which are scripts (such as PHP, ASPX, etc.) that perform as a control panel graphical user interface (GUI). An attacker could […]
February 15, 2016
Via: Tech RepublicAccording to Gartner, “connected things” in smart homes and smart buildings represent 45% of 1.1 billion IoT devices in 2015. For that many devices, it is disconcerting that security pundits are asking whether these “connected things” are secure. However, it’s […]
February 5, 2016
Via: Security IntelligenceSoftware applications access many of the most important assets organizations manage, such as intellectual property, strategic plans and customer data. This makes them a very lucrative target for cyber-criminals. Unfortunately, applications are often the weakest link in the enterprise IT […]
Cloud security, Privacy protection
November 26, 2015
Via: Help Net SecurityIdentity Mixer, a new tool to protect a consumer’s personally identifiable information, is now generally available on IBM Cloud. The tool is built on years of cryptography research, and holds the key to helping to reduce identity theft happening as […]
September 3, 2015
Via: malwareIBM’s X-Force research team has uncovered a new piece of data-swiping malware whose modular design allows it to be quickly altered and made even more dangerous. CoreBot’s main threat is its ability to steal passwords stored in the endpoint’s browser […]
August 26, 2015
Via: cloud-security#ibm is beefing up its offerings in software-defined #storage, which promises to let IT departments better deal with large amounts of storage by uncoupling the management software from its underlying hardware. The company has expanded two products in its #spectrum […]
April 23, 2015
Via: threats-and-malware#ibm announced at RSA Conference 2015 it is bringing its Security Intelligence technology, IBM QRadar, to the cloud, giving companies the ability quickly prioritize real threats and free up critical resources to fight cyberattacks. The new services are available to […]
April 16, 2015
Via: threats-and-malware#ibm has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public organizations, researchers and other #network defenders. On Thursday, the company opened up over 700 terabytes of #data about vulnerabilities, attacks […]
April 30, 2024
April 11, 2024
April 30, 2024