Security

Webinar: How digitalization of business contributes to the recycling earth’s resources

Learn how digitization of business processes for mobile devices helps to recycle Earth’s resources and with this create a better world for our children. Learn how intelligent use of mobile devices and business process digitization has helped RGS Nordic  increase productivity and improve their Results with Unified Endpoint Management. In the webinar Morten Norup, Admire […]

Continue reading

Visit our new landing site and a new way to Think about IBM Security

This is the starting point for IBM Security related blogs and solution information. In IBM Security, we help protect the world’s data against cyber attacks in a challenging and constantly changing environment which puts us under obligation to continuously evolve our capabilities. On this site you will find key elements of our solutions that builds […]

Continue reading

Follow the conversation


Inside Threat Study – IBM Cloud Identity Connect SaaS

IBM Cloud Identity helps you secure user productivity with cloud-delivered Single Sign-On (SSO), multifactor authentication, and identity governance. It comes with thousands of pre-built connectors that help you quickly provide access to popular SaaS and On-Prem apps; and pre-built templates to help integrate in-house apps. With this a study carried out this year by CA […]

Continue reading

IBM SECURITY SUMMIT

Securing the threats of tomorrow, today! We live in an age of exponential change with more data, connected devices and computing power than ever before. While this affords businesses tremendous opportunities, it also creates more ways for cyber-criminals to breach an organization. Headlines from the past year shine a spotlight on the growing speed and […]

Continue reading

4 Ways to protect your Crown Jewels

For today’s generation, there is arguably no greater challenge than cybercrime. From stealing private information and damaging reputations to crashing critical infrastructure and putting enterprises at risk, today’s cybercriminals are testing the limits of security and resiliency. If you step back and think about it, the list of potential perpetrators is daunting in scope. It […]

Continue reading

The median number of vulnerabilities in mobile apps tested

According to Codedx, 2017 was no stranger to application security threats, with some of the biggest hacks, to date, taking place. In fact, during the third quarter of 2017 there were  more than 230 million web application attacks on websites in the U.S. Despite these figures, a 2017 study on mobile and IoT application security […]

Continue reading

RGS Nordic using IBM® MaaS360® with Watson™ to gain 100 percent visibility

Mobile devices offer a powerful way to streamline workflows—but new requirements such as the General Data Protection Regulation (GDPR) mean it’s more important than ever for companies to stay in control of their assets. Working with ADmire, RGS Nordic uses IBM® MaaS360® with Watson™ to gain 100 percent visibility of all its mobile devices in […]

Continue reading

Healthcare Cybersecurity Vulnerabilities

New Cybersecurity threats are emerging in Healthcare daily. Here are three Cybersecurity trends emerging in 2018:    1. Ransomware attacks via connected devices will be more severe Hackers target medical and IoT devices that provide, transmit, and access confidential data because they can exploit the fact that most manufacturers did not consider cybersecurity when designing […]

Continue reading

Where does mainframe security figure into the Industry 4.0 era?

The crown jewels of Industry 4.0 The fourth industrial revolution, Industry 4.0, is a new technological vision for the entire IT world in which mainframe security plays a crucial role. In this world, the mainframe contains roughly 75 percent of enterprise data and 65 percent of active code. We know the first three industrial revolutions […]

Continue reading