​Welcome IBM Tech Now, our video web series featuring the latest and greatest news and announcements in the world of technology. Make sure you subscribe to our YouTube channel to be notified every time a new IBM Tech Now video is published.

IBM Tech Now: Episode 81

On this episode, we’re covering the following topics:

Stay plugged in

You can check out the IBM Blog Announcements for a full rundown of all news, announcements, releases, and updates, and hit the subscribe button on our YouTube channel to see all the new IBM Tech Now episodes as they’re published.

Missed the previous episodes? Check out the full playlist.

Have feedback, comments, suggestions, or ideas? We’d love to hear from you, so leave us a comment on the video. ​

Categories

More from Cybersecurity

Closing the breach window, from data to action

6 min read - Accelerate threat detection and response (TDR) using AI-powered centralized log management and security observability It is not news to most that cyberattacks have become easier to launch and harder to stop as attackers have gotten smarter and faster. For those defending against cyberthreats, things continue to get more complicated. The list of challenges is long: cloud attack surface sprawl, complex application environments, information overload from disparate tools, noise from false positives and low-risk events, just to name a few. The…

Spear phishing vs. phishing: what’s the difference?

5 min read - The simple answer: spear phishing is a special type of phishing attack. Phishing is any cyberattack that uses malicious email messages, text messages, or voice calls to trick people into sharing sensitive data (e.g., credit card numbers or social security numbers), downloading malware, visiting malicious websites, sending money to the wrong people, or otherwise themselves, their associates or their employers. Phishing is the most common cybercrime attack vector, or method; 300,479 phishing attacks were reported to the FBI in 2022.…

Data breach prevention: 5 ways attack surface management helps mitigate the risks of costly data breaches

5 min read - Organizations are wrestling with a pressing concern: the speed at which they respond to and contain data breaches falls short of the escalating security threats they face. An effective attack surface management (ASM) solution can change this. According to the Cost of a Data Breach 2023 Report by IBM, the average cost of a data breach reached a record high of USD 4.45 million this year. What’s more, it took 277 days to identify and contain a data breach. With…

Success and recognition of IBM products continues in G2 2023 Fall Reports

2 min read - IBM offerings were featured in more than 1,300 unique G2 reports, earning over 320 Leader badges across various categories. We are grateful to our customers for sharing the positive and constructive feedback needed to achieve these milestones, and we congratulate our tireless IBM team and partners who strive and achieve excellence.   Rankings on G2 reports are based on data provided by real software buyers. As stated by Sara Rossio, Chief Product Officer at G2, “Potential buyers know they can trust these insights…