Mainframe March 9, 2015 The Absence of Evidence Is Not the Evidence of Absence 3 min read - Large corporations tend to have a lack of data or evidence. By completing their data set, they can gain insight into their systems and protect themselves.
Intelligence & Analytics March 2, 2015 Seeing the Unseen With an Advanced Security Operations Center 2 min read - In security operations, the growing complexity and quantity of structured and unstructured data makes it increasingly difficult to manage.
Intelligence & Analytics February 26, 2015 The Endless Quest for Certainty Through SIEM 3 min read - Just because you have a SIEM does not mean you have real-world security. But you are one step closer as long as you use it to answer who did what and how.
Endpoint February 23, 2015 Creating a Security Strategy to Stay Ahead of Targeted Attacks and Advanced Threats 3 min read - Organizations must keep threat intelligence in mind when crafting a security strategy meant to protect them against increasingly sophisticated threats.
Data Protection February 20, 2015 Data Security Goes Beyond Technology 2 min read - Today's critical business data is under constant threat, which is why enterprises must apply adequate data protection for their data security measures.
Intelligence & Analytics February 9, 2015 How to Create Impact With Your Information Security Report in the Boardroom 3 min read - When creating an information security report as a CISO, it is important to appeal to the needs of the decision-making executives in the boardroom.
Mainframe February 3, 2015 Infrastructure Protection for the Threats of Today and Tomorrow 3 min read - The Infrastructure Protection track at InterConnect will feature insights from the IBM X-Force Research and Development team and customer success stories.
Intelligence & Analytics January 28, 2015 Sin City or Security City? Rethink Your Security Strategy in Las Vegas 3 min read - The Security Analytics and Fraud Protection track at IBM InterConnect is the ideal place to learn about the newest fraud and threat protection techniques.
Intelligence & Analytics January 27, 2015 What Do Silver Bullets, Bearings and Engines Have to Do With Security Intelligence? 5 min read - While we have mastered designing and implementing bearings over time, we seem to continue to struggle with keeping security intelligence up-to-date.
Intelligence & Analytics January 22, 2015 How Physical Security Defenses Influence Cybersecurity 5 min read - There are many parallels between cybersecurity and physical security when it comes to prioritizing valuables and being careful to keep them safe.