Security category

How to detect and patch a Log4J vulnerability 

6 min read - The Log4j vulnerability, or “Log4Shell,” is considered one of the most catastrophic software flaws ever. Apache patched the flaw in December 2021, yet it remains a concern for security teams. In fact, it is still among the most exploited security vulnerabilities. Log4Shell persists because the Apache Log4j 2 software package it affects is one of the world's most widely used logging libraries. Finding and fixing every instance of Log4Shell is expected to take a decade, according to the US Department of Homeland…

SIEM and threat intelligence: Stay current on trending threats

3 min read - With the average cost of a data breach soaring to an all-time high at USD $4.45 million dollars in 2023, organizations face an ever-increasing array of cybersecurity threats. These threats can range from ransomware attacks to phishing campaigns and insider threats, potentially resulting in data breaches. As cybercriminals become more sophisticated and their tactics more varied, it's essential for businesses to adopt advanced security measures to protect their sensitive data and digital assets. Two crucial tools in the modern cybersecurity…

Developer Tricks: Simulate Cloud Security for Local App Development

5 min read - Everything you need to do to simulate the environment of a trusted profile compute resource. Does this sound scary? Trusted profile, compute resource, access token, token conversion? I recently had to deal with these for an app deployed to Kubernetes. In this blog post, I discuss how I managed to develop and test the app on my local machine. As a developer, I prefer to develop (including testing) and code locally. Sometimes, the code needs to interact with functionality that…

25 IBM Products Win Top Rated Distinction from TrustRadius

2 min read - The latest results from the TrustRadius Top Rated Awards are in. Thank you to our clients for providing feedback on the value of IBM products and solutions. Your experiences continue to shape product roadmaps and your reviews inspire confidence. Client feedback provides much-needed assurance to prospective buyers that a given product will actually solve their problem, relaying both the pros and cons as crucial key insights. Along with price transparency and free demos or trials, awards like TrustRadius Top Rated…

Failed to load data