The Latest in IT Security

Posts Tagged ‘security posture’

Clients regularly ask IBM’s X-Force Incident Response team to scan their networks for intrusions, malicious activities or other risk factors. One such risk factor that we look for is the use of weak passwords. As countless security compromises have shown, weak passwords are a common root cause for the initial breach of a victim network.

Read more ...

A survey conducted by Gartner in the fourth quarter of 2013 provides some important information on the bring-your-own-device (BYOD) trend and how it impacts the security posture of organizations. The report shows that US consumers dont appear to be too concerned about the security risks associated with BYOD. Of the close to 1,000 business users […]

Read more ...

In any relationship, good communication is key, especially in the world of enterprise IT. In a new study from the Ponemon Institute, a survey found that among those who rated their organizations as having a low security posture, only six percent said they had effective communication with senior executives about security issues. Forty-two percent said […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments