security

Cybersecurity doesn’t need more tools; it needs new rules.

Let’s be frank: Chief information security officers (CISOs) and security professionals all know cybersecurity complexity is a major challenge in today’s threat landscape. Other folks in the security industry know this too — although some don’t want to admit it. The problem is that amid increasing danger and a growing skills shortage, security teams are […]

Continue reading

IBM Security Guardium Analyzer

IBM Security Guardium Analyzer helps organizations efficiently address regulated data risk through data discovery, data classification, vulnerability scanning and database risk scoring for on-premises and cloud databases. Sign up for your free trial of IBM Security Guardium Analyzer Click here, and please download the IBM Security Guardium Data Connector to a Windows-based server and ensure […]

Continue reading

NextBriefing: Security

All over the world digital transformation is forcing business leaders to take action regarding risk, security and continuity in order to protect customers and business itself. According to IDC’s Nordic security survey, 45% of businesses have experienced a data breach which compromised customer relations and destroyed digital trust. Today it is a matter of when, not if, […]

Continue reading

BREAKTHROUGH TO IMPACT – Invitational event in Paris

MIT Technology Review, the authority and leader of global discourse on emerging technologies backed by the preeminent technology institute, has teamed up with IBM, the world’s premier cognitive solutions and cloud platform company, to launch the Innovation Leaders Summit and make impact.  The summit presents a carefully curated analysis of cutting – edge technologies in […]

Continue reading

The unsecured cloud – true or not?

It’s not uncommon to meet organizations avoiding cloud hosted IT solutions for security or data control reasons. But are cloud services really less secure than an on-premise solution? Some common objections against using the cloud are usually based on an organization’s need to control their data. This can be related to regulations and compliance but most […]

Continue reading

Arrow Security Inspiration

IBM has together with other IT cooperations partnered up to present the Event: “Arrow Security Inspiration“. IT security is probably the subject of the global IT industry that has peaked most in recent years. The threat of hackers and IT criminals against citizens, businesses and authorities has moved very close, and the digital attacks are becoming […]

Continue reading

Post The GDPR Compliance Deadline – Are all companies now GDPR Compliant?

Interestingly in relation to this question a surprising number of companies believe they are not compliant according to research carried  out by TrustArc and published on July 12th. Below are some of the interesting findings they got: Only 20% of those surveyed believe they are compliant. In fact 27% have not yet started the implementation. […]

Continue reading

Webinar: How digitalization of business contributes to the recycling earth’s resources

Learn how digitization of business processes for mobile devices helps to recycle Earth’s resources and with this create a better world for our children. Learn how intelligent use of mobile devices and business process digitization has helped RGS Nordic  increase productivity and improve their Results with Unified Endpoint Management. In the webinar Morten Norup, Admire […]

Continue reading

Visit our new landing site and a new way to Think about IBM Security

This is the starting point for IBM Security related blogs and solution information. In IBM Security, we help protect the world’s data against cyber attacks in a challenging and constantly changing environment which puts us under obligation to continuously evolve our capabilities. On this site you will find key elements of our solutions that builds […]

Continue reading