Security

Strategies for Securing Your Business – Part II

Blog Series: IT Perspectives by Jaqui Lynch In our initial security blog we talked about what is meant by security and what kinds of assets need to be protected. One of the items mentioned was the detection and prevention of threats. In this blog we will discuss an...

Strategies for Securing Your Business – Part I

Blog Series: IT Perspectives by Jaqui Lynch This is the first entry in a series of blogs covering the role of security in businesses today. When people talk about the fastest areas of growth in IT today we automatically think about cloud, mobile, social media and web...

Closed-Loop Risk Management

How IBM BigFix and IBM Security QRadar work together to fill in the gaps of cybersecurity With today’s advanced threats growing stealthier, more dynamic and more damaging, the need for integrated, intelligent, automated resources has never been greater. BigFix and...
Cybercrime’s Epic Year

Cybercrime’s Epic Year

Contributor: Limor Kessom, IBM Security Looking back at cybercrime in 2015 leaves little doubt that the year was nothing short of epic. The IBM/Ponemon Institute report 2015 Cost of Data Breach Study put the average total cost of a data breach at $3.79 million, an...
Smarter Security, Smarter Everything

Smarter Security, Smarter Everything

In many cases, organizations do not discover their own security threats/breaches—the discovery is made by an external third party and then reported to the victim organization. When breaches are discovered internally, they typically come from either active methods...