Data Protection March 6, 2015 Big Data Requires Big Protection 3 min read - Big data management presents complex challenges, and enterprises need real-time monitoring and alerting to track what is happening and what may happen.
Cloud Security February 26, 2015 Has Your Cloud Security Become a Juggling Act? 3 min read - Cloud security is what prevents many businesses from making the leap and adopting the cloud to manage their data and protect their information
Application Security February 26, 2015 Three Must-Have Capabilities for Effective Cloud-Based Application Security Testing 3 min read - Cloud services deserve application security testing processes that can seamlessly integrate with the build process to create an automated system.
Endpoint February 24, 2015 Philosophy vs. Reality: How IBM Achieves Mobile Security for 400,000 Employees 3 min read - Most companies today, including IBM, face the challenge of managing and securing mobile devices. Learn how IBM protects its workforce of 400,000 employees.
Cloud Security January 13, 2015 How IBM’s Patent Leadership Translates to the Future of Cloud Security 2 min read - Inventing new approaches and coming up with sophisticated innovations will be key for organizations looking to develop cloud security strategies.
CISO January 8, 2015 Cloud Adoption Can Boost Security for an SMB 3 min read - A small or midsize business (SMB) can benefit from adopting the cloud because of its increased security level and lower costs.
Cloud Security December 24, 2014 23 Best Practices for Cloud Security 6 min read - Cloud security is no longer just a luxury. Here are some best practices to consider when partnering with a third-party cloud service provider.
CISO December 17, 2014 Security Technology a Top Focus for CISOs 2 min read - Security leaders are focusing their attention on improving security technology in the face of innovations in the cloud, mobile devices and big data.
December 9, 2014 Security Researchers: Google App Engine May Contain More Than 30 Vulnerabilities 2 min read - Holes in Google App Engine could allow third parties to access or steal information from the company's cloud-based service for hosting Web apps.
December 4, 2014 More Is Less? EMC Study Finds Data Protection Better With One Vendor 3 min read - According to a recent EMC study, data protection is easier and cheaper when organizations partner with one vendor rather than multiple ones.