Blog Series: IT Perspectives by Jaqui Lynch In our initial security blog we talked about what is meant by security and what kinds of assets need to be protected. One of the items mentioned was the detection and prevention of threats. In this blog we will discuss an...
Blog Series: IT Perspectives by Jaqui Lynch This is the first entry in a series of blogs covering the role of security in businesses today. When people talk about the fastest areas of growth in IT today we automatically think about cloud, mobile, social media and web...
Vulnerability management activities have long been a core requirement for organizations seeking to understand the extent of their exposures and overall security state of their networks. Yet many security teams continue to struggle when faced with the operational...
How IBM BigFix and IBM Security QRadar work together to fill in the gaps of cybersecurity With today’s advanced threats growing stealthier, more dynamic and more damaging, the need for integrated, intelligent, automated resources has never been greater. BigFix and...
Contributor: Limor Kessom, IBM Security Looking back at cybercrime in 2015 leaves little doubt that the year was nothing short of epic. The IBM/Ponemon Institute report 2015 Cost of Data Breach Study put the average total cost of a data breach at $3.79 million, an...
In many cases, organizations do not discover their own security threats/breaches—the discovery is made by an external third party and then reported to the victim organization. When breaches are discovered internally, they typically come from either active methods...