Jul 18, 2016 | All Blogs, Cloud, Security
Contributor: Mark Campbell, Cloud Security, IBM If you haven’t played the new “Pokemon Go” game yourself, someone close to you definitely has. The game has gone viral since its release, and it has people out in droves wandering around neighborhoods looking for...
Jul 5, 2016 | All Blogs, Mobile, Security
Blog Series: IT Perspectives by Jaqui Lynch Mobile Devices For the past three days I have been in upgrade turmoil. There are two people in this house and between us we have three desktops, four laptops, two IPADs, two iPhones and2 iPods. All of these need upgrading at...
Jun 28, 2016 | All Blogs, Security
Contributor: Charles Kolodgy, Senior Security Strategist, IBM The term endpoint conveys a terminus — the end of the journey. However, for IT endpoints, be they computers, mobile devices, servers, point-of-sale terminals or a myriad of other devices belonging to the...
Jun 16, 2016 | All Blogs, Security
Cyber-crime is becoming an increasing challenge with the frequency and sophistication of cyber-attacks growing. Even worse data breaches are often detected by outsiders, affecting customers or brand image before the organization even knows that they have been...
May 20, 2016 | All Blogs, Mobile, Security
Still think smartphones are a fad? Are you convinced that tablets have just about run their course? Are you of the opinion that people shouldn’t be doing work wherever they go, anyway? Do you see yourself as a lone crusader for LYOD (leave your own device)?“Denial...
May 17, 2016 | All Blogs, Security
Blog Series: IT Perspectives by Jaqui Lynch Exploring QRadar In my previous blogs, Strategies for Securing Your Business – Part I & II, I talked about some of the new roles in security along with some of the things to think about with respect to security including...