IBM Security i2

The Library is the place to find attachments from the group's discussions posts as well as file uploads and other resources that will help you learn and develop your skills. If you're looking for something specific that you can't seem to find, ask in the forums and your peers might just have something useful to share!

Search Library Entries

35 Entries
 
 
2 years ago

Powerful IBM® i2® intelligence analysis software supports DeliverFund in its mission to take a cyber intelligence-driven approach to fighting human trafficking. Leveraging the power ...

Attachments
2 years ago

With the rise of advanced threats, the SOC is faced with the growing challenge of adversaries skilled at evading detection. In addition, analysts are overwhelmed by the volume and complexity ...

Attachments
2 years ago

Join us for a discussion with veteran threat hunter Bruce Parkman as he shares his experiences hunting the bad guys on the front lines across physical and cyberspace, including missions ...

Attachments
2 years ago

IBM i2 has been helping analysts outthink the bad guys for over 28 years across law enforcement, government, national security and defense. Now, the private sector is adopting these ...

Attachments
2 years ago

Join us for a discussion with veteran threat hunter Michael McCracken as he shares his experiences hunting the bad guys on the front lines across physical and cyberspace, including ...

Attachments