The Latest in IT Security

Posts Tagged ‘IBM’

An author on the IBM security blog recently got an interesting request. The developer of a mobile malware kit wasn’t pleased with their reporting, so they reached out to correct the record. IBM’s coverage wasn’t helping the criminal’s business, and so the researcher’s post needed fixing. The email came from the author and core developer […]

Read more ...

Conventional IT management calls for a means to visualize all activity, from the network and data center to the cloud, devices, users, apps and everything between. Without a security information and event management (SIEM) solution such as IBM QRadar, this challenge is nearly insurmountable. Featuring 35 apps on the IBM Security App Exchange, IBM Security […]

Read more ...

IBM Security is always looking for high-volume anomalies that might signify a new attack trend. One example is webshells, which are scripts (such as PHP, ASPX, etc.) that perform as a control panel graphical user interface (GUI). An attacker could utilize a webshell to gain system-level access to a vulnerable server. Over the past two […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments