The Latest in IT Security

Posts Tagged ‘Technology’

As the RSA Conference kicks off this week, IBM Security will be approaching the anniversary of two important milestones. This time two years ago, we put our stake in the ground to lead the incident response space with the acquisition of Resilient Systems. At RSA last year, we brought the power of Watson to the […]

Read more ...

Hype over artificial intelligence reached its zenith in 2017, with CIOs, consultants and academics touting the technology as potentially automating anything from business and IT operations to customer connections. Yet through the first calendar quarter of 2018 several media organizations reported on the dangers of AI, which involves training computers to perform tasks normally requiring […]

Read more ...

NetworkMiner is a popular network forensics tool that can parse pcap files as well as perform live sniffing of network traffic. It collects data about hosts on the network rather than to collect data regarding the traffic on the network…

Read more ...


Categories

FRIDAY, MARCH 29, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments