1 to 8 of 8
Sort by

Blog Entry
Cloud and Cloud-Native Security (Part 1): Security Advantages of Container Orchestration Platforms

It’s safe to say that many long-time IBM Aspera customers look at our transport technology as more than just the fastest way to move data over commodity IP networks. Security is in our DNA, as the fasp (Fast Adaptive Secure Protocol) implies. From the lowest level, Aspera ensures the...

James Wilson's profile image

Ask Us Anything Office Hours - Security

Security Join your Cloud Customer Success Managers and Cloud Design Engineers to ask any questions about your Cloud Platform account. This week's theme is security so we will share tips to make your account more secure but as always, all questions are welcome! Please note these office hours...

 Wed September 16, 2020 | 12:00 PM - 12:30 PM ET

Library Entry
Featured Presentation from IBM VP & CTO Sridhar Muppidi: Continuous Security for Hybrid Multicloud

Organizations must adopt the cloud to drive digital transformation but this presents some new challenges and concerns for IT leaders, that must operate and maintain business as usual, even with more complex, hybrid and multi-cloud environments. Take a look at this presentation and learn how to...

Continuous Security for Hybrid Multi Cloud.pptx

Library Entry
Webex on Security Hardening - How to lock down DataPower so that it is secure from hacking

Here are the WebEx Recording and the Presentation from the Webex on Security Hardening - How to lock down DataPower so that it is secure from hacking presentation. #security #DataPowerGateways

2 attachments

Library Entry
Hiding sections of the user interface

This details how to customize headers with corporate colors and logos A best practice of User Interface (UI) design is to show only the information that a end user requires Showing only the information that your users care about can greatly increase their productivity and reduce your support...

Pam Denny's profile image

Blog Entry
Federated Learning - Part 2

1. Introduction In the first of our blog series on federated learning in partnership with IBM Research, we wrote about the mechanism for federated learning as well as the technology behind the paper that won the Best Paper Award 2019 at AISec 2019. It is very helpful to start with that blog...

NATHALIE BARACALDO's profile image

Library Entry
The interaction of CHLAUTH and CONNAUTH in IBM MQ

The interaction of CHLAUTH and CONNAUTH in IBM MQ Mark P Wilson |Dec 4 2016 Updated This article explains the interaction between channel authentication records (CHLAUTH) and connection authentication (CONNAUTH) in IBM MQ. When an application connects to MQ using client bindings, network...

The interaction of CHLAUTH and CONNAUTH in IBM MQ.docx

Naomi Scott's profile image

Blog Entry
Think 2020 Call for Speakers is OPEN!

The Think 2020 Call for Speakers is open! May 4-7 San Francisco. It's time to think about Think 2020 and we want to hear from our IBM Security Community. Tell us your story and submit your proposal, the more technical the better! Opportunities you’ll have as a speaker at Think • ...

Wendy Batten's profile image