Welcome to the IBM TechXchange Community, a place to collaborate, share knowledge, & support one another in everyday challenges. Connect with your fellow members through forums, blogs, files, & face-to-face networking.
IBM TechXchange Community Together, we can connect via forums, blogs, files and face-to-face networking. Find your community
IBM Security Guardium Data Protection helps secure your sensitive data, wherever it resides, and align your security strategy with zero trust principles to tackle key initiatives such as addressing data privacy, insider threat, and cloud security. In our continued efforts to help you to evolve...
Regardless of industry, data security compliance is critical. Whether adhering to the various industry-specific and general regulations or responding to the growing customer demand for greater data security around sensitive personal data, organizations are faced with a variety of...
Top vulnerabilities for containers include Misconfigurations Securing registry images Runtime threats And Vulnerability Advisor, addresses just that, a container-based vulnerability scan, with integrations with various image registries. Read more about this here -> ...
Out in the field we are seeing more and more interest in using Automation. Automation has, of course, been around for some time. One of my first roles in IBM was working with GDPS (a family of services offerings for automation Disaster Recovery and Business Continuity in the Mainframe space,...
GRC is everyone’s business September 26, 2019 | Written by: David Marmer In my May 2019 blog, “Has GRC Reached Its Tipping Point? Observations From The Front Lines” , I described a set of common patterns that are driving business initiatives in Governance, Risk &...
1 Comment - no search term matches found in comments.
The IBM GRC Community is a place where we can share information relative to OpenPages and IBM FIRST. Members can see upcoming events, webinars and enablements. Members can also be kept up to date on upcoming releases, technical tips, share use cases and get other notices relative to our GRC...
Vulnerability identification and remediation are critical to maintaining a secure environment. Today, most organizations are using one or multiple vulnerability scanning tools to identify vulnerabilities on endpoints such as business critical servers, laptops and desktops. They also have...