Getting Started
Learn more about TechXchange Dev Days virtual and in-person events here
In March, as a response to Executive Order (EO) 14110, Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence, the U.S. Department of Treasury released the Managing Artificial Intelligence-Specific Cybersecurity Risks in the Financial Services Sector report . The report...
1 Comment - no search term matches found in comments.
The NIST Cybersecurity Framework (NIST CSF) provides comprehensive guidance and best practices that private sector organizations like financial institutions can follow to improve information security and cybersecurity risk management. IBM Distinguished Engineer, Jeff Crume, walks us through...
Axway is modernizing its development platform for the benefit of its customers to distribute the new technologies provided by IBM. In collaboration with our partner Corelia , Axway is investing in a new Mainframe IBM Z16 platform which uses the #Telum processor, IBM's latest innovation,...
by @Rohit Badlaney GM, IBM Cloud Product and Industry Platforms As we look ahead to 2024, enterprises around the world are undoubtedly evaluating their progress and creating a growth plan for the year to come. For organizations of all types—and especially those in highly regulated...
Data Security .... Data Security .... Data Security!!!! I am super excited to be presenting 4 sessions at TechXchange in Las Vegas next month all around Data Security and how Data Security can help your organization with the evolution of data happening. We're going to discuss the...
We have 2 timely and important episodes coming up next week for IBM Expert TV -- IBM Security Behind the Shield. We hope to see you there! Tuesday, March 8th, 1:00 PM ET Episode 4: Highlights from the 2022 X-Force Threat Intelligence Index Guest: IBM X-Force Strategic Cyber...
Cybersecurity starts with awareness and each of us should take this to heart in this new digital age we live in. Cybersecurity is critical because it protects all categories of data from theft and damage . This includes sensitive data, personally identifiable information (PII), protected...
There might not be a more interesting topic in the technology world today than cybersecurity. Sure, we might be biased—both of us work in the industry and love what we do. Cybersecurity news and information used to be relegated to niche websites and tech pubs, but today it’s a focus of virtually...