Retail November 19, 2018 Retail Cybersecurity Is Lagging in the Digital Transformation Race, and Attackers Are Taking Advantage 4 min read - Retail cybersecurity requires a large-scale transition to cope with new threat vectors, close significant infrastructure gaps, and extend security protocols across new cloud and SaaS platforms.
Cloud Security November 9, 2018 How Can Companies Move the Needle on Enterprise Cloud Security Risks and Compliance? 3 min read - Traditional vulnerability assessments don't always show the full picture of cloud security, compliance and risk. How can enterprises get ahead of the curve?
November 2, 2018 DemonBot Targeting Hadoop Clusters to Perform DDoS Attacks 2 min read - Security researchers reported that a new bot called DemonBot is targeting Hadoop clusters to execute distributed denial-of-service (DDoS) attacks.
October 29, 2018 New Phishing Scheme Exploits Public Interest Around Hurricane Michael to Steal Email Credentials 2 min read - Security researchers discovered a recent phishing scheme that took advantage of Hurricane Michael's impact to steal victims' email credentials across multiple services.
Intelligence & Analytics October 16, 2018 Simplify Your Security With an Open Cloud-Based Platform 3 min read - Today, we're announcing IBM Security Connect, an open, cloud-based platform that is capable of analyzing federated security data across unconnected tools and environments.
Data Protection October 3, 2018 The Wild West of Data Risk Management in the Age of Cloud, Mobile and Digital Transformation 3 min read - In today's rapidly evolving security environment, it's imperative for organizations to establish a formal data risk management program that does more than just check the boxes.
Endpoint October 3, 2018 Visibility and Control: A One-Two Punch for Securing iOS Devices in the Enterprise 3 min read - With many organizations now dependent on iOS devices, security leaders must balance productivity and security with the right endpoint management solution.
August 21, 2018 New Ransomware Family Appends ‘.Armage’ to Encrypted Files 2 min read - Researchers from Quick Heal Security Labs discovered a new family of ransomware that spreads via spam emails and appends the extension ".Armage" to all files it encrypts.
Cloud Security June 18, 2018 How Cloud Security Can Drive Innovation and Transform Your Business 3 min read - At the May 2018 IBM Security Summit in London, industry experts discussed how organizations could transform their business by developing a formal strategy for cloud security.
Data Protection June 12, 2018 Ransomware Recovery: Maintain Control of Your Data in the Face of an Attack 5 min read - Organizations can significantly reduce the risk and cost of ransomware recovery by investing in cloud data protection tools that feature file and object store encryption capabilities.