Security

Addressing Rising Insider Threats With Zero Trust

Did you know that insider threats account for 60% of cyberattacks on enterprises?

Continue reading

IBM Security – Keeping The Flag Flying High

It is with immense pride that I want to share a couple of significant announcements related to our security portfolio. IBM Security QRadar, our flagship security software offering, has been positioned as a leader in the Gartner Magic Quadrant for SIEM. Also, IBM is positioned as a leader in the IDC MarketScape: Asia/Pacific Cloud Security […]

Continue reading

How is SecurView Securing It’s Clients’ Digital Transformation Journey With Its Next-Gen SOC?

Today, it is well-positioned to guide enterprises’ security architecture in their digital transformation roadmap.

Continue reading

Preserving Customer Privacy With Zero Trust

To say that the pandemic accelerated the growth in online shopping, as more people chose to make purchases from the comforts of their home, is an understatement. Digital interactions on a rise As per a survey titled IBM Consumer Security Study – India Report, conducted by Morning Consult, on behalf of IBM Security, there was […]

Continue reading

Security Orchestration is About Strong Playbooks. Learn to Build A Solid One.

For everyone who has spent time in a Security Operations Center (SOC), this carries a striking resemblance to how SOCs around the globe plan their response to security incidents. Isn’t it?

Continue reading

IBM India Security Community: 4 Steps To Join and Meet The Experts

a great resource to help Security experts, the IBM India Security User Group, part of the global IBM Security Community

Continue reading

Bangladesh based Prime Bank Limited secures Leadership with IBM next-gen Cognitive SOC

Author: Sudeep Das, Technology Sales, IBM Global Markets Prime Bank, one of the largest commercial banks in Bangladesh, recently completed 25 years of existence. Over these years, it has kept pace with change and is now best known for its new initiatives of Digital Banking services. In fact, Bank is now in full swing on […]

Continue reading

Checkmate Insider Threats with User Behavior Analytics

Cyberattacks come from a variety of sources. Attackers look to breach security firewalls setup by organizations through the slightest of available openings. These can range from: proliferation of endpoints that is dominated by the increasing spread of IoT enabled devices and networks to.. employees creating Shadow IT scenarios, by signing up for a variety of […]

Continue reading