Search

1 to 10 of 13
Sort by

Blog Entry
Securing Endpoints by Leveraging AI and MITRE For Your Remote Workforce

Authors: Lolita Chandra and Sophia Sampath Earlier this year there was a massive transition to a largely remote workforce across the globe and over a very short span of time. According to Gallup , “From mid-March to mid-May 2020, the percentage of U.S. employees working from home...


Blog Entry
Install and deploy apps in minutes with AppHost, Resilient’s new integration infrastructure

We are pleased to announce the general availability of AppHost, IBM Security Resilient’s new integration infrastructure that containerizes integrations and brings integration management into the WebUI, reducing the installation and deployment time of applications to minutes. The goal of a...


Blog Entry
Behind the Scenes: Tech in the Cyber Range with Matt Dobbs, "Identity and Access for the Cyber Range Using IBM Cloud ID"

In our second installment of "Behind the Scenes: Tech in the Cyber Range," Matthew Dobbs (Chief Integration Architect) continues the discussion Identity and Access for the Cyber Range using IBM Cloud ID. Here Matt will give you a technical perspective on Cloud ID and how the team uses it in...


Blog Entry
2020 Cost of a Data Breach Report: Key Findings and Resources

The annual Cost of a Data Breach Report offers a window into what real organizations that have experienced a cyber breach are doing well, and not so well, in preventing and responding to these attacks. In partnership with the Ponemon Institute, IBM Security publishes this report to offer...


Blog Entry
Application and Identity Modernization with OpenShift and IBM Security Verify

OpenShift is becoming the hybrid cloud platform stack enterprises are using for building multi-cloud applications. As developers are enabled to quickly develop applications for any cloud, build once deploy anywhere , it becomes critical to ensure how those assets are protected - protecting...

Milan Patel's profile image

Blog Entry
Learn How Trusteer Solved a Large-Scale SMS Phishing Attack in Japan

Co-authored by Shir Levin The IBM Security Trusteer team just battled an interesting case of account takeover (ATO) fraud that targeted end-users of a large retail bank application in Japan. This application normally deals with around 200 fraud sessions a month. Last month, that number shot...

Eran Coster's profile image

Library Entry
On-Demand Webinar: See How IBM's Integrated Threat Management Solution Detects a Real Attack

This ATT&CK demo shows how IBM Security's threat management tooling enables organizations to detect, investigate and remediate a real attack, using the latest hacking tools and techniques, perpetrated against an up-to-date Windows 8.1 victim machine. The demo will illustrate: ...


Library Entry
Guardium Vulnerability Assessment v11.2 — Overview and Latest New Features

The latest release of Guardium Vulnerability Assessment, v11.2, has many new features. This Tech Talk will provide an overview of these features, which include: support for Microsoft Azure cloud databases, support for new CVE's, custom upload of datasources, SSL support for data-source...

Guardium Vulnerability Assessment 11-2_webinar_presentation.pdf


Blog Entry
In Z Security, We Can’t Afford to be Distracted

These are very unusual times. Everyone around the world has to change daily lives in ways that were inconceivable just a couple months ago. It can be very distracting. Stay focused. With all the personal and business changes many of us are being asked to work from home. This brings an entire...


Blog Entry
Adding Analytics to your IGA infrastructure

In this blog, I will talk about how you can add analytics to your IGA infrastructure. Before we go into details on how analytics will help organizations to proactively reduce Identity and access related risks, let us look at why we need Identity analytics and what analysts are saying on why...

PRITI PATIL's profile image