IBM Security i2

The Library is the place to find attachments from the group's discussions posts as well as file uploads and other resources that will help you learn and develop your skills. If you're looking for something specific that you can't seem to find, ask in the forums and your peers might just have something useful to share!

Search Library Entries

35 Entries
 
 
one year ago

Click on the URL link below to review an article explaining how to subscribe to the i2 newsletter. The i2 newsletter provides the latest i2 product information such as new release notifications, ...

Attachments
2 years ago

Here's an interesting blog about the term "threat hunting" as applies in the cyber domain. It is authored by Jake Munroe, i2 product marketing manager and U.S. Navy veteran with an ...

Attachments
2 years ago

This short 6-minute video walks you through how to make a request through IBM's website for an i2 product enhancement.

Note: You must have an IBM user id before you use this RFE ...

Attachments
2 years ago

Check out this article, "Embrace the Intelligence Cycle to Secure Your Business," by Matthew Farenden, Senior Offering Manager for the i2 portfolio.

In the article, Matt outlines ...

Attachments
2 years ago

Check out this interesting read from Jake Munroe, a member of our worldwide IBM i2 team. Jake is a U.S. Navy veteran with an extensive background in counterterrorism, cyber threat intelligence, ...

Attachments
2 years ago

Check out this insightful perspective from an IBM i2 Cyber SME, Sidney Pearl, who talks about a tectonic shift occurring in the cybersecurity community with the convergence and blurring ...

Attachments
2 years ago

By using analytics to lift the veil over match-fixing, we can support our partners with compelling evidence to help build solid sports disciplinary as well as criminal cases.
#i2

Attachments
2 years ago

Using intelligence analysis technology to disrupt and prevent human trafficking

Attachments