The Latest in IT Security

Posts Tagged ‘IBM’

According to Gartner, “connected things” in smart homes and smart buildings represent 45% of 1.1 billion IoT devices in 2015. For that many devices, it is disconcerting that security pundits are asking whether these “connected things” are secure. However, it’s a good enough question that IBM’s X-Force Security Research Group has decided to find out. […]

Read more ...

Software applications access many of the most important assets organizations manage, such as intellectual property, strategic plans and customer data. This makes them a very lucrative target for cyber-criminals. Unfortunately, applications are often the weakest link in the enterprise IT security chain. Recent IBM X-Force Threat Intelligence reports have shown that many disclosed security incidents […]

Read more ...

Identity Mixer, a new tool to protect a consumer’s personally identifiable information, is now generally available on IBM Cloud. The tool is built on years of cryptography research, and holds the key to helping to reduce identity theft happening as the result of sharing personal data on mobile and web apps.

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments