Rep page support

This module is visible to IBMers only.

Module will be re-enabled on refresh.

DSC Page Auditor

Rep ID: robert.steininger@ie.ibm.com

Rep Group: Live

Population: IIS

Rep Enabler modules:

- Social links: JSON

- Messages/Videos/Events: JSON

[NEWS] As Cyber Risk Escalates, the C-Suite Must Take Action

20. April 2018

As long as C-suite executives believe that cybersecurity is an IT issue, they will remain disengaged from the solutions and their role in supporting a robust cyber risk management strategy. The post As Cyber Risk Escalates, the C-Suite Must Take Action appeared first on Security Intelligence.

Teilen

Mehr dazu

[VIDEO] Marc van Zadelhoff Keynote Address at RSA

20. April 2018

RSAC keynote with Marc van Zadelhoff — General Manager of IBM Security. Watch it online here: #RSAC

Teilen

Mehr dazu

[NEWS] Collaboration Among Security Vendors Is the Threat Management Solution of the...

18. April 2018

To stay ahead of tomorrow's cyberthreats, organizations need a threat management solution that consolidates disparate security products into a centralized platform. The post Collaboration Among Security Vendors Is the Threat Management Solution of the Future appeared first on Security Intelligence.

Teilen

Mehr dazu

[NEWS] Cybersecurity’s Next Major Challenge: Connecting Human and Machine Intelligence

17. April 2018

Today, IBM introduced the Resilient Incident Response Platform (IRP) with Intelligent Orchestration and X-Force Threat Management services to help organizations connect human and machine intelligence. The post Cybersecurity’s Next Major Challenge: Connecting Human and Machine Intelligence...

Teilen

Mehr dazu

[NEWS] Key Findings from the Third Annual Study on Cyber Resilience: Dr. Larry Ponemon

16. April 2018

Responding to cyber security incidents remains a major challenge for most organizations globally, according to IBM Resilient’s latest report, “The Third Annual Study on the Cyber Resilient Organization."

Teilen

Mehr dazu

[Podcast] Social Engineering 101: How to Hack a Human

16. April 2018

In this podcast, IBM Senior Security Architect and inaugural DerbyCon Social Engineering Capture the Flag (SECTF) winner Joe Gray offers a crash course in social engineering.

Teilen

Mehr dazu

[NEWS] Social Engineering: A Trick as Old as Time

13. April 2018

Social engineering dates back to ancient times. Today, the most common forms of social trickery include baiting, vishing, phishing and other schemes designed to exploit human nature. The post Social Engineering: A Trick as Old as Time appeared first on Security Intelligence.

Teilen

Mehr dazu

[NEWS] The new hot trend in cyberthieving is holding your cloud data ransom.

12. April 2018

“It is no longer realistic to believe that we can prevent these attacks from happening," said one cybersecurity expert. To read more ...

Teilen

Mehr dazu

[NEWS] A New Lease on Innovation

12. April 2018

We are investing in innovation... but so my peers and competitors. The best way to fund innovation comes with the same for all of us. Have you tried leasing disruption instead of buying it? For more information go to: https://ibm.co/2zAeWLJ

Teilen

Mehr dazu

[NEWS] Keep Your Eyes on the Threat Horizon to Improve Incident Response

12. April 2018

The ever-growing list of cybersecurity threats looks like something out of a 21st century version of “The Wizard of Oz” — but instead of lions and tigers and bears (oh my!), today’s security professionals must contend with Internet of Things (IoT) data leaks ...

Teilen

Mehr dazu

Zu kostenlosen Webinaren anmelden

Zu kostenlosen Webinaren anmelden

11. April 2018

Lernen Sie in interaktiven Webinaren mehr über IT-Lösungen aus den Bereichen Cloud, Security, Analytics, IoT und mehr. Filtern Sie einfach nach Thema und Sprache um eine Übersicht über die für Sie relevanten Webinare zu erhalten.

Teilen

Mehr dazu

Innovationen, die die Welt verändern

Innovationen, die die Welt verändern

5. April 2018

Jedes Jahr präsentieren wir einige der größten Durchbrüche aus den globalen Labors von IBM Research - fünf Technologien, von denen wir glauben, dass sie Wirtschaft und Gesellschaft in den nächsten fünf Jahren grundlegend verändern werden.

Teilen

Mehr dazu

IBM auf der HANNOVER MESSE 2018

IBM auf der HANNOVER MESSE 2018

Wann: 23. April 2018 - 27. April 2018

Wo: Halle 7 - Stand C16

Details: Entdecken Sie am IBM Stand IBM Technologien anhand interaktiver Showcases und IBM Kundenbeispielen, die auf Ihre Industrie zugeschnitten sind.

Teilen

Jetzt registrieren

IBM Cloud Infrastruktur: Geben Sie einem unserer virtuellen oder Bare-Metal-Server eine Chance und sparen Sie viel Geld!

IBM Cloud Infrastruktur: Geben Sie einem unserer virtuellen oder Bare-Metal-Server eine Chance und sparen Sie viel Geld!

16. März 2018

Sie erhalten 60 Tage lang 50% auf unseren Listenpreis für ausgewählte virtuelle Server- und Bare-Metal-Server-Angebote. Das ist Ihre Chance, eine Vielzahl von IBM Cloud-Infrastrukturangeboten auszuprobieren.

Teilen

Mehr dazu

Echte Power für künstliche Intelligenz in Unternehmen: die neuen POWER9 Server von IBM

Echte Power für künstliche Intelligenz in Unternehmen: die neuen POWER9 Server von IBM

20. Februar 2018

IBM Power Systeme bieten eine innovative Plattform für klassische Anwendungen, Cloud-Umgebungen und kognitive Anwendungen zu einem überraschend erschwinglichen Preis.

Teilen

Mehr dazu

Die EU-Datenschutz-Grundverordnung kommt! Sind Sie bereit?

Die EU-Datenschutz-Grundverordnung kommt! Sind Sie bereit?

12. Februar 2018

IBM bietet umfassende Lösungen, Services und Expertise, um Sie bei Ihren Vorbereitungen für die GDPR zu unterstützen.

Teilen

Mehr dazu

Optimierung von Business Analytics im gesamten Unternehmen

Optimierung von Business Analytics im gesamten Unternehmen

12. Februar 2018

Gewinnen Sie mit IBM Cognos Analytics on Cloud bessere, fundiertere Business-Intelligence-Erkenntnisse, ohne dass die Leistung darunter leidet.

Teilen

Mehr dazu

IBM Security Ransomware & Analytics Starterpakete

IBM Security Ransomware & Analytics Starterpakete

12. Februar 2018

Mit den IBM Security Starterpaketen bestens für kommende Hackerangriffe vorbereitet sein. Informieren und testen!

Teilen

Mehr dazu

Bereit für Ihre Blockchain-Lösung?

Bereit für Ihre Blockchain-Lösung?

12. Februar 2018

Die Blockchain revolutioniert 2018 das Internet der Dinge und wird Grundlage vieler Business-Anwendungen. Aber welchen Nutzen können Unternehmen aus dem Einsatz dieser Technologie ziehen?

Teilen

Mehr dazu

IBM Watson Workspace

IBM Watson Workspace

12. Februar 2018

Zusammenarbeit im Team mit den integrierten kognitiven Funktionen von Watson. Alles Erforderliche, um optimal arbeiten zu können.

Teilen

Mehr dazu

IBM Cloud Private: Eine Lösung für Ihre geschäftlichen Herausforderungen

IBM Cloud Private: Eine Lösung für Ihre geschäftlichen Herausforderungen

12. Februar 2018

Erstellen Sie Anwendungen schneller und skalieren Sie bedarfsgerecht dank einer leistungsfähigen Cloud-Infrastruktur in Ihrem eigenen Rechenzentrum.

Teilen

Mehr dazu

Wie schützen Sie Ihr Unternehmen vor Ransomware?

Wie schützen Sie Ihr Unternehmen vor Ransomware?

7. Dezember 2017

Erfahren Sie in unserem Webinar, worauf es beim Schutz vor Angriffen mit Verschlüsselungssoftware ankommt.

Teilen

Mehr dazu

Das ist IBM Cloud Private. Nicht irgendeine Private Cloud

Das ist IBM Cloud Private. Nicht irgendeine Private Cloud

7. Dezember 2017

Schnell. Flexibel. Intelligent. Offen. Auf Unternehmen abgestimmt.

Teilen

Mehr dazu

Optimieren Sie Ihren Einkauf bei IBM

Optimieren Sie Ihren Einkauf bei IBM

20. November 2017

Wir beraten und unterstützen Sie kostenlos dabei, Ihre Einkäufe bei IBM schneller, einfacher und kostengünstiger abzuwickeln. Nutzen Sie unsere Online Services und kommen Sie auf uns zu.

Teilen

Mehr dazu

IBM Watson Analytics

IBM Watson Analytics

3. August 2017

Intelligente Datenanalyse und Visualisierung in wenigen Minuten

Teilen

Mehr dazu

Einfaches Management mobiler Endgeräte

9. September 2016

Schützen und verwalten Sie Ihre mobilen Geräte, Apps und Inhalte mit IBM MaaS360. Jetzt kostenlos testen!

Teilen

Mehr dazu

[NEWS] Strengthening Cybersecurity’s Weakest Links With Deep Network Insights

9. April 2018

With the right SIEM solution, organizations can generate deep network insights to gain visibility into security weaknesses and determine when and where critical assets are most vulnerable. The post Strengthening Cybersecurity’s Weakest Links With Deep Network Insights appeared first on Security...

Teilen

Mehr dazu

[NEWS] Financial Malware Trends and Predictions: Organized Cybercrime Continues to Rise

6. April 2018

As security tools improve, malicious actors are increasingly operating as organized cybergangs and less sophisticated actors are falling behind, according to X-Force analysis of malware trends.

Teilen

Mehr dazu

[NEWS] 2018 IBM X Force Report: Shellshock Fades, Gozi Rises and Insider Threats Soar

6. April 2018

The latest IBM X-Force report highlighted threats stemming from misconfigured cloud servers and inadvertent insider negligence and examined malware trends from the 2017 that could continue into 2018. The post 2018 IBM X Force Report: Shellshock Fades, Gozi Rises and Insider Threats Soar appeared...

Teilen

Mehr dazu

[NEWS] Millennials, Baby Boomers and the Future of Identity

4. April 2018

IBM's "Future of Identity Study" was commissioned in order to study global and generational preferences on authentication. In this podcast, a millennial and a baby boomer discuss their online habits regarding passwords and more.

Teilen

Mehr dazu

[NEWS] Five Steps for Investigating and Responding to Employee Fraud

3. April 2018

In the rush to deflect blame in the wake of an insider attack, many organizations fail to answer critical questions that could help them avoid similar cases of employee fraud in the future. The post Five Steps for Investigating and Responding to Employee...

Teilen

Mehr dazu

[Podcast] Collaboration: The Secret to More Effective Security

3. April 2018

Companies today face both internal and external pressure to strengthen their security postures. In such an environment, collaboration is the secret to more effective security.

Teilen

Mehr dazu

[NEWS] Windows Device Management: From XP to 10 and Everything in Between

29. März 2018

The traditional Windows device management solutions that IT admins have used for years are evolving into unified endpoint management solutions to fit the needs of today's security landscape.

Teilen

Mehr dazu

[WEBINAR] How the IBM BigFix Ecosystem Enables Defense in Depth

Wann: 7. Juni 2018

Details: Managing and securing endpoints is a complex job with many moving parts. IT operations and security teams are responsible for different but highly interdependent things. And neither team will succeed unless the other does as well. These teams frequently use many, non-integrated tools from many ...

Teilen

Jetzt registrieren

[WEBINAR] The Transformative Power of GDPR for People and Business

Wann: 22. Mai 2018

Details: Organizations around the world are working hard to prepare before the EU General Data Protection Regulation (GDPR) becomes enforceable on May 25, 2018. GDPR will dramatically change how organizations handle personal information and is expected to significantly impact operations for EU-based ...

Teilen

Jetzt registrieren

[NEWS] A Letter From the Future: It’s January 2019 and Hackers Are Stealing Your Data

29. März 2018

IBM Security General Manager Marc van Zadelhoff shares his 'Letter from the Future' and talks about what organizations can do to make a difference as we move forward.

Teilen

Mehr dazu

[NEWS] IBM Sustains a Leadership Position in 2018 Gartner Magic Quadrant for Application Security Testing

28. März 2018

IBM sustained its position in the "Leaders" Quadrant in the 2018 Gartner Magic Quadrant for Application Security Testing, which spanned 12 total vendors. The post IBM Sustains a Leadership Position in 2018 Gartner Magic Quadrant for Application Security Testing appeared first on ...

Teilen

Mehr dazu

[News] Top cybersecurity evasion and exfiltration techniques used by attackers

26. März 2018

SS8 released its 2018 Threat Rewind Report, which reveals the top cybersecurity evasion and exfiltration techniques used by attackers and malicious insiders.

Teilen

Mehr dazu

[News] Excessive alerts, outdated metrics, lead to over-taxed security operations centers

23. März 2018

A report from Dr. Chenxi Wang finds that excessive alerts, outdated metrics, and limited integration lead to over-taxed security operations centers.

Teilen

Mehr dazu

[NEWS] Survey Roundup: Many Companies Falling Short on Infosec Training

22. März 2018

A survey of around 9,500 executives in 122 countries found 44% said they lack an overall information security strategy, 47% don't mandate employee training on privacy policies and 49% don't have an accurate inventory of personal data in their company's possession.

Teilen

Mehr dazu

[NEWS] Three Pitfalls to Avoid on Your Data Security Journey

21. März 2018

The EU General Data Protection Regulation (GDPR) has called for enterprises to assess existing data security policies and procedures. What does this mean for your organization's efforts? The post Three Pitfalls to Avoid on Your Data Security Journey appeared first on Security Intelligence.

Teilen

Mehr dazu

[NEWS] Security Pros Get an IBM Security Community They Can Call Their Own

20. März 2018

The new IBM Security Community enables cybersecurity professionals to connect with peers, share threat intelligence and glean insights from subject matter experts. The post Security Pros Get an IBM Security Community They Can Call Their Own appeared first on Security Intelligence.

Teilen

Mehr dazu

IBM Security Summit in Utrecht on the 17th of May - Registration now open

Wann: 17. Mai 2018

Wo: Utrecht

Details: Designed for Security Leaders and their senior team members, discussions will focus on real stories from the field and practical examples. Network with peers and security experts to discover how to make your organization cyber-resilient, prepare for ‘boom moments’ like ransomware attacks, ...

Teilen

Jetzt registrieren

IBM Security Summit in London on 15th May - Registration now open

Wann: 15. Mai 2018

Wo: London

Details: Designed for security leaders and their senior team members, discussion will focus on stories from the field and practical examples of how organisations are: preparing for ‘boom moments’ like ransomware attacks, tackling the skills shortage by embracing new technologies such as AI, and building ...

Teilen

Jetzt registrieren

[NEWS] New Ponemon Report: Too Many Organizations Don’t Have a Plan to Respond to Incidents

15. März 2018

When a cyberattack occurs, most organizations are unprepared and do not have a consistent incident response plan. That’s the major takeaway from our third annual “Cyber Resilient Organization” study, conducted by the Ponemon Institute. The study revealed that 77 percent of respondents still lack ...

Teilen

Mehr dazu

[News] What Happens When You Hold Robots for Ransom?

13. März 2018

Researchers explore why an attacker would target robots with ransomware, and the implications of what might happen if they did.

Teilen

Mehr dazu

[News] Intelligence sharing is crucial in the fight against cybercrime

13. März 2018

A higher level of collaboration and intelligence sharing between industries is ever-more crucial in the fight against cybercrime. Malware advances no longer focused on ‘traditional’ enterprise targets as cybercriminals expand their scope.

Teilen

Mehr dazu

[News] Cyber attacks becoming No. 1 business risk

9. März 2018

We are engaged in a cyber arms race, pitting the cyber security industry against those who seek to profit from cybercrime.

Teilen

Mehr dazu

[News] Most healthcare breaches still come from hacking

6. März 2018

The Bitglass 2018 Healthcare Breach Report found that in 2017 the number of individuals affected by breaches within the healthcare sector reached a four-year low.

Teilen

Mehr dazu

[News] Hackers breached German government's secure computer networks

5. März 2018

The Russia-linked Sofacy hacking group has breached the secure computer networks of a number of German federal agencies.

Teilen

Mehr dazu

[News] New Android Malware Family Highlights Evolving Mobile Threat Capabilities

2. März 2018

RedDrop can steal data, record audio, and rack up SMS charges for victims, says Wandera.

Teilen

Mehr dazu

[News] Cryptojacking is the new malware

1. März 2018

Each cryptojacked machine may provide a small fraction of computing cycle time but, when combined, they are transformed into distributed supercomputers that can earn hackers substantial cryptocurrency amounts.

Teilen

Mehr dazu

[NEWS] Beyond the Password Era: Changing Consumer Habits Signal the End Is Near

1. März 2018

A recent IBM Security study found that consumers, especially millennials, are beginning to embrace alternatives to password protection, such as biometric authentication. The post Beyond the Password Era: Changing Consumer Habits Signal the End Is Near appeared first on Security Intelligence.

Teilen

Mehr dazu

[POLL] Select the GDPR questions below that most concern you — and we'll answer them in our March 14 webinar!

26. Februar 2018

or submit an additional question using the 'other' field. IBM's GDPR and data security subject matter experts will answer your top

Teilen

Mehr dazu

[Video] Excellium and IBM Security, a partnership for success | The MSP Hub

23. Februar 2018

In this video, David Dutertre from Excellium. discusses how the business has formed a partnership with IBM Security for success in the managed services market.

Teilen

Mehr dazu

[NEWS] IBM X-Force IRIS Uncovers Active Business Email Compromise Campaign Targeting Fortune 500 Companies

22. Februar 2018

IBM X-Force IRIS observed a widespread business email compromise (BEC) campaign targeting many Fortune 500 companies that exploits flaws in common accounts payable processes.

Teilen

Mehr dazu

[NEWS] The Journey to Security and Cyber Resiliency

22. Februar 2018

At Think 2018, attendees will learn how an integrated approach to security and resiliency can help them prevent cyberattacks and effectively respond to the ones that slip through their defenses. The post The Journey to Security and Cyber Resiliency appeared first on Security Intelligence .

Teilen

Mehr dazu

[PODCAST] Data Risk Management in 2018: What to Look for and How to Prepare

19. Februar 2018

In this podcast, IBM Security's Dan Goodes and Nev Zunic discuss how to bring a greater focus to data risk management practices within the organization and among the C-suite and board.

Teilen

Mehr dazu

[NEWS] TrickBot's Cryptocurrency Hunger: Targeting Exchange Users to Steal Coins

19. Februar 2018

TrickBot is getting in on the cryptocurrency gold rush, expanding its operations to target digital wallets and exchanges using serverside injections and other malicious tactics.

Teilen

Mehr dazu

[TIP] A Safer Internet Starts With Us All: Three Things I Pledge to Do

7. Februar 2018

A safer internet starts with us all. What will you pledge to do this Safer Internet Day to help raise security awareness and promote a better browsing experience for our children?

Teilen

Mehr dazu

[NEWS] Using Machine Learning to Make Faster, Smarter Decisions About Insider Threats

6. Februar 2018

Security professionals need a comprehensive way to analyze user behavior, automatically respond to reports of suspicious activity and manage user access accordingly to thwart insider threats. The post Using Machine Learning to Make Faster, Smarter Decisions About Insider ...

Teilen

Mehr dazu

[NEWS] Android Device Management: Sweet Features, No Toothache

5. Februar 2018

Android device management doesn't need to be difficult, as long as security leaders consider the privacy needs of the organization, IT department and user population before rolling out a UEM solution. The post Android Device Management: Sweet Features, No Toothache appeared first ...

Teilen

Mehr dazu

[NEWS] Why Endpoint Management Is Critical to Security Strategy

5. Februar 2018

Endpoint management is typically the responsibility of the IT operations or infrastructure teams, not the security team. So why should security care about endpoint hygiene? Pervasive Endpoint Vulnerabilities Attacks come from all directions, and many of them originate on endpoints...

Teilen

Mehr dazu

[NEWS] Top 6 things to look for in a unified endpoint management solution

23. Januar 2018

Unifying the management of your various endpoint devices is essential in 2018. Mobility is more critical than ever to successful business outcomes, while risks are increasing, regulations are more stringent and the impact of security breaches are more harmful. It’s a perfect storm...

Teilen

Mehr dazu

Webinar Recording: Was wir von Raubrittern über Hacker lernen können - Einführung in SIEM

Webinar Recording: Was wir von Raubrittern über Hacker lernen können - Einführung in SIEM

Eine Einführung zum Thema SIEM – Security Incident and Event Management vom 27. Oktober 2015.

Teilen

Jetzt ansehen

[VIDEO] Threat Hunting: The human element

[VIDEO] Threat Hunting: The human element

Organizations need to start proactively protecting their IT environments. Threat hunting is a process combining automation and human analysis for early detection and remediation of cybersecurity attacks. The knowledge and experience of threat hunters play a very important role in ...

Teilen

Jetzt ansehen

Site and Facility Services

Minimieren Sie die Risiken und Komplexität, die mit Planung sowie Realisierung oder der Modernisierung eines Rechenzentrums verbunden sind.

Teilen

Mehr dazu

E-Mail an diesen Ansprechpartner

Die mit einem Stern (*) markierten Felder müssen zum Abschließen dieser Transaktion ausgefüllt werden.