Arm yourself with insights on the latest security topics to keep up with the evolving threat landscape. Learn more about modern and trusted technology and services that evolve with your business, including threat detection & response, data security, identity & access management, and more.

IBM’s immersive incident response training expands with new DC Cyber Range

3 min read - It’s been said before: cyberattacks are not a matter of if but when. While it’s difficult for organizations to predict exactly when an attack might hit, they can prepare for one to help strengthen their cyber readiness and mitigate devastating impacts. The global average cost of a data breach reached USD 4.45 million, with the U.S. facing the highest breach costs across all regions. For public organizations, the cost of a cyber crisis transcends monetary costs. Threat actors can disrupt…

Enterprise security is facing an identity crisis: Findings from the latest X-Force Threat Intelligence Index

2 min read - In this year’s IBM X-Force Threat Intelligence Index, our annual report of cybersecurity trends, we observed a pronounced surge in cyber threats targeting identities. Cyber criminals leveraged stolen credentials in 30% of the investigations X-Force responded to in 2023, which tracks a 71% increase compared to the previous year. Let’s take a look at some of the key findings from this year’s report. There are several ways that cybercriminals obtain valid credentials to use in breaches. In 2023, one of…

How to implement the General Data Protection Regulation (GDPR)

10 min read - The General Data Protection Regulation (GDPR), the European Union's landmark data privacy law, took effect in 2018. Yet many organizations still struggle to meet compliance requirements, and EU data protection authorities do not hesitate to hand out penalties. Even the world's biggest businesses are not free from GDPR woes. Irish regulators hit Meta with a EUR 1.2 billion fine in 2023. Italian authorities are investigating OpenAI for suspected violations, even going so far as to ban ChatGPT briefly. Many businesses…

What are breach and attack simulations?

4 min read - Breach and Attack Simulation (BAS) is an automated and continuous software-based approach to offensive security. Similar to other forms of security validation such as red teaming and penetration testing, BAS complements more traditional security tools by simulating cyberattacks to test security controls and provide actionable insights. Like a red team exercise, breach and attack simulations use the real-world attack tactics, techniques, and procedures (TTPs) employed by hackers to proactively identify and mitigate security vulnerabilities before they can be exploited by…

Failed to load data

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters