IT security

2018 is the year of security: Are you secure enough?

Data security, IBM Systems Lab Services, Power servers...

Multiple security advisories in the recent past have shown how tirelessly security researchers work to identify and address vulnerabilities. With the extensive reach of the Internet, the digital space has become a hacker’s world. Keeping your IT environment protected is an important part of any enterprise IT strategy. Having a vulnerability doesn’t necessarily mean something ...read more


Who do you trust with your IT security?

Data security, Encryption, Hybrid cloud...

Security is a word that’s used to cover many aspects of IT, and it’s a top concern for organizations today, but there’s another important word related to the vendors of IT security products and solutions that safeguard your business: trust. Securing your business data and applications from malicious access or tampering rests on trust in ...read more


Taking security to the next frontier

Data security, Ecosystem & partners, Linux systems...

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the In The Making blog. The opinions in these blogs are their own, and do not necessarily reflect the views of IBM. Attackers always have the upper hand on the information security battlefield. They can ...read more


4 Pillars for choosing a technology asset disposition vendor

Data security

Before the 1980s, very little data was stored on computers. Most data remained on tape or magnetic disk. The data center kept those devices secure and shredded them at the end of their lives. The process kept sensitive information safe. Today, it’s not that simple. Proprietary and confidential data exists across many smaller devices. A ...read more