1 to 10 of 66
Sort by

Blog Entry
Effective Data Security and Compliance for Hybrid Multi-Cloud Environments

Authors: Walid Rjaibi, Mohammed Alhamid and Mokhtar Kandil IBM Security – Data Security As organizations modernize their IT and expand into hybrid multi-cloud environments, data security and compliance become increasingly challenging. Fragmented and disconnected security tools do not...

Walid RJAIBI's profile image

Blog Entry
Welcome to the 2021 class of IBM Security Champions

It is my great honor to welcome this year’s IBM Security Champions. This exceptional group of 78 customers and business partners are pacesetters in the security industry, demonstrating expertise with leading technologies while providing extraordinary advocacy across local and digital...

Justin Youngblood's profile image

Blog Entry
Recipe for Integrating QRadar and IBM Security Verify

IBM Security Verify and IBM QRadar Integration Introduction IBM® QRadar® is Security Information and Event Management (SIEM) which helps security teams accurately detect and prioritise threats across the enterprise, and it provides intelligent insights that enable teams to...

Vandana Verma Sehgal's profile image

Blog Entry
Safeguarding Data With Proactive Threat Detection

It’s a data-driven world and data is the new crown jewel that serves as one of the key assets for the growth of an organization. Data is also assisting organizations to discover new business insights, identify buying patterns, business trends, customer behavior and more—all of which are required...

SANDEEP PATIL's profile image

Blog Entry
Social Login with LinkedIn on IBM Security Verify

Co-authored by Saloni Rathi . Social Login with LinkedIn on IBM Security Verify As a user if I am going to a website or application and the first thing application asks is for registration and lot of information. I don't want to share too much information while registration. I don't...

Vandana Verma Sehgal's profile image

Blog Entry
How MaaS360 User Risk Management and Carbon Design are redefining UX

WHY USER RISK MANAGEMENT? The average cost of a data breach is $3.86M, according to a recent report by IBM Security. Remote work during COVID-19 is only expected to exacerbate the situation, increasing data breach costs, and incident response times. To combat this threat...

Dhanashree Kolhe's profile image

Blog Entry
QRadar App Management - support utilities, CLI, API - need-to-know

During the course of my troubleshooting experience i had to be aware of some “utility changes” regarding to app extension management and monitoring. According to the applied Release of QRadar and deployment scenario (AiO / Apphost as a managed host), you’ll have to keep in mind some ...

Ralph Belfiore's profile image

Blog Entry
The New Frontier of Fraud – Massive Mobile Emulator Fraudulent Operation

Co-authored by Ezra Maybruch. As the use of mobile devices grows exponentially in all industries, fraudsters are looking for innovative ways of exploiting this field. Consequently, IBM Security Trusteer Fraud Analytics has recently discovered a new large-scale mobile emulator-based fraud...

Doron Hillman's profile image

Blog Entry
Work Profile On Corporate Owned Android Devices

I hope that everyone is familiar with Android Enterprise and the various management styles that have been supported by MaaS360 since it's inception in Android 5.0 (if not, check out this link ): Work Profile (often referred to as Profile Owner or PO) - creates a work partition on the device...

Matt Shaver's profile image