Rep page support

This module is visible to IBMers only.

Module will be re-enabled on refresh.

DSC Page Auditor

Rep ID: robert.steininger@ie.ibm.com

Rep Group: Live

Population: IIS

Rep Enabler modules:

- Social links: JSON

- Messages/Videos/Events: JSON

[NEWS] Understanding SIEM Technology: How to Add Value to Your Security Intelligence...

17. Juli 2018

As the threat landscape expands — and IT skills grow increasingly scarce — many security leaders don't know how to get the most out of their security information and event management (SIEM) solution. The post Understanding SIEM Technology: How to Add Value to Your Security Intelligence ...

Teilen

Mehr dazu

[NEWS] Security Analysts Are Overworked, Understaffed and Overwhelmed — Here’s How...

16. Juli 2018

Today's security teams lack the time, talent and resources to keep up with the rapidly evolving threat landscape. AI can automate tedious processes and take some pressure off security analysts. The post Security Analysts Are Overworked, Understaffed and Overwhelmed — Here’s How AI Can Help appear...

Teilen

Mehr dazu

Watson Services auf IBM Cloud - Workshop für Entwickler

Watson Services auf IBM Cloud - Workshop für Entwickler

Wann: 25. September 2018 09:00:00 Uhr - 25. September 2018 17:00:00 Uhr

Details: In diesem Workshop erhalten Sie einen Überblick über die Watson-Technologie und lernen, wie kognitive Anwendungen erstellt werden.

Teilen

Jetzt registrieren

WeAreDevelopers Konferenz

16. Juli 2018

IBM Code beim WeAreDevelopers World Congress in Wien. Die Zusammenfassung gibt's hier.

Teilen

Mehr dazu

Deutschsprachiges Webinar „Container Orchestrierung mit IBM Kubernetes Service“ am 19. Juli

Deutschsprachiges Webinar „Container Orchestrierung mit IBM Kubernetes Service“ am 19. Juli

Wann: 19. Juli 2018 10:00:00 Uhr - 19. Juli 2018 11:00:00 Uhr

Details: Dieser Webcast gibt einen kurzen Überblick über die zugrunde liegenden Technologien und zeigt in einer Demo die Leistungsfähigkeit der IBM Cloud Kubernetes Services.

Teilen

Jetzt registrieren

[NEWS] IBM X-Force IRIS Cyberattack Preparation and Execution Frameworks

11. Juli 2018

A new white paper highlights how IBM X-Force IRIS characterizes and communicates threat intelligence to help organizations improve their cyberattack preparation and response capabilities.

Teilen

Mehr dazu

Aktuelle Master@IBM Stellen-Angebote

Aktuelle Master@IBM Stellen-Angebote

10. Juli 2018

Steigt ein in die vielseitige Arbeitswelt eines globalen Technologie-Unternehmens und gestaltet die digitale Transformation des IBM Vertriebs in der Digital Business Group aktiv mit.

Teilen

Mehr dazu

[NEWS] The Hack React: Testing a SOC Director's Cybersecurity Incident Response

10. Juli 2018

When Lincoln Healthcare experiences a watering hole attack, security operations center (SOC) director Malcolm Gerhard is tasked with developing a swift cybersecurity incident response. Will he succeed?

Teilen

Mehr dazu

[VIDEO] ThinkResearch uses IBM Cloud to deliver the best medical information at the...

[VIDEO] ThinkResearch uses IBM Cloud to deliver the best medical information at the...

By condensing and organizing current medical research, ThinkResearch continually delivers updated consultation and treatment protocols for use with patients. By using IBM Cloud infrastructure and managed Kubernetes services, ThinkResearch DevOps teams stay focused on innovating for their customer...

Teilen

Jetzt ansehen

[Podcast] Can the Girl Scouts STEM the Skills Gap?

5. Juli 2018

Could the Girl Scouts' new science, technology, engineering and mathematics (STEM) badge program help stem the cybersecurity skills gap? Listen to a new SecurityIntelligence podcast to find out.

Teilen

Mehr dazu

[NEWS] Behind the Scenes of the Science Channel Special, ‘Dark Web: Fighting...

3. Juli 2018

IBM Security teamed up with Atomic Entertainment and Science Channel to produce a documentary about the nature of the Dark Web and innovations in the security industry. The post Behind the Scenes of the Science Channel Special, ‘Dark Web: Fighting Cybercrime’ appeared first on ...

Teilen

Mehr dazu

[PODCAST] Hacker Highschool Is Inspiring the Next Generation of Defensive Hackers

2. Juli 2018

Listen to this podcast to discover how Hacker Highschool and IBM Security are uniting to deliver a new lesson that teaches teens about using defensive hacking skills for good.

Teilen

Mehr dazu

[NEWS] Goal! Spam Campaigns Capitalize on the World Cup Craze

29. Juni 2018

BM X-Force researchers observed several ongoing spam campaigns tied to the World Cup — many of which used the official branding of tournament sponsors to lure victims. The post Goal! Spam Campaigns Capitalize on the World Cup Craze appeared first on Security Intelligence.

Teilen

Mehr dazu

[NEWS] Why Your Teen Should Develop Hacking Skills This Summer

27. Juni 2018

Hacking skills promote empathy, grit and creative problem solving — characteristics that can take teens far in their future careers, whether they pursue cybersecurity or any other field of study. The post Why Your Teen Should Develop Hacking Skills This Summer appeared first on Security Intellige...

Teilen

Mehr dazu

[NEWS] Fight Fire With Fire: How AI Plays a Role in Both Stopping and Committing DDoS Attacks

25. Juni 2018

When the machine learning technology cyber defenders use to stop DDoS attacks inevitably falls into the hands of malicious actors, which side will win? The post Fight Fire With Fire: How AI Plays a Role in Both Stopping and Committing DDoS Attacks appeared first on Security Intelligence.

Teilen

Mehr dazu

[NEWS] Why Privileged Access Management Is Key to Preventing Insider Threats

21. Juni 2018

To protect their networks from insider threats, security teams need greater visibility into privileged accounts held by both employees and third-party vendors. The post Why Privileged Access Management Is Key to Preventing Insider Threats appeared first on Security Intelligence.

Teilen

Mehr dazu

CALL FOR CODE.

CALL FOR CODE.

15. Juni 2018

Call for Code bietet Software-Entwicklern die Chance an der Lösung brennender globaler Probleme mitzuwirken.Machen Sie mit bei der Call for Code Challenge 2018! Beschreiten Sie neue Wege, mit Naturkatastrophen umzugehen, und die besten Lösungen zu finden, auf Katastrophen besser vorbereitet zu sein.

Teilen

Mehr dazu

[NEWS] Space Rogue: A Security Rebel Turned Pen Tester

14. Juni 2018

Two decades ago, Cris Thomas testified before Congress about various cybersecurity issues he uncovered as a white hat hacker. Today, he works as a penetration testing specialist for IBM X-Force Red. The post Space Rogue: A Security Rebel Turned Pen Tester appeared first on Security Intelligence.

Teilen

Mehr dazu

Site and Facility Services

Minimieren Sie die Risiken und Komplexität, die mit Planung sowie Realisierung oder der Modernisierung eines Rechenzentrums verbunden sind.

Teilen

Mehr dazu

CALL FOR CODE.

CALL FOR CODE.

13. Juni 2018

Call for Code bietet Software-Entwicklern die Chance an der Lösung brennender globaler Probleme mitzuwirken.Machen Sie mit bei der Call for Code Challenge 2018! Beschreiten Sie neue Wege, mit Naturkatastrophen umzugehen, und die besten Lösungen zu finden, auf Katastrophen besser vorbereitet zu sein.

Teilen

Mehr dazu

[NEWS] GDPR: Time to Move Forward — and Keep It Going

13. Juni 2018

Now is the time for organizations to move forward with the GDPR readiness plans and ensure that compliance activities are embedded into their overall security strategy. The post GDPR: Time to Move Forward — and Keep It Going appeared first on Security Intelligence.

Teilen

Mehr dazu

[NEWS] Narrowing the Gaps in Unified Endpoint Management (UEM)

6. Juni 2018

Unified endpoint management (UEM) delivers on the promise of bringing a vast range of endpoints and enterprise use cases under one management console. The post Narrowing the Gaps in Unified Endpoint Management (UEM) appeared first on Security Intelligence.

Teilen

Mehr dazu

[NEWS] Are Ransomware Attacks Rising or Falling?

1. Juni 2018

There are conflicting reports over whether or not ransomware attacks are growing. Many organizations state that it's the most popular malware form, but is this true? The post Are Ransomware Attacks Rising or Falling? appeared first on Security Intelligence.

Teilen

Mehr dazu

[NEWS] Security Pros Get an IBM Security Community They Can Call Their Own

31. Mai 2018

The new IBM Security Community enables cybersecurity professionals to connect with peers, share threat intelligence and glean insights from subject matter experts.

Teilen

Mehr dazu

[NEWS] IBM Q’s Dr.Robert Sutor explains the state of the quantum computing industry

30. Mai 2018

During C2 Montreal, BetaKit interviewed Dr. Robert Sutor, an R&D executive responsible for the IBM Q program, about the future of the industry.

Teilen

Mehr dazu

[NEWS] New Banking Trojan MnuBot Discovered by IBM X Force Research

30. Mai 2018

IBM X-Force Research has uncovered a new Brazilian, Delphi-based malware active in the wild in a recent campaign dubbed MnuBot. The post New Banking Trojan MnuBot Discovered by IBM X Force Research appeared first on Security Intelligence.

Teilen

Mehr dazu

[NEWS] The Security Data Scientist Is the Icing on the Cake

28. Mai 2018

Many organizations are hiring a security data scientist to support analysts and provide deep insights to the chief information security officer (CISO). The post The Security Data Scientist Is the Icing on the Cake appeared first on Security Intelligence.

Teilen

Mehr dazu

[NEWS] Lessons From the Cold War: Data Security Through Obscurity

28. Mai 2018

What can the Cold War teach us about data security? More than you may realize. Explore alternative methods for securing transmitting data. The post Lessons From the Cold War: Data Security Through Obscurity appeared first on Security Intelligence.

Teilen

Mehr dazu

So schnell wie eine Public Cloud - so sicher wie eine private.

So schnell wie eine Public Cloud - so sicher wie eine private.

25. Mai 2018

IBM Cloud Private. Schnell. Flexibel. Professionell. Entwickeln Sie offene, cloud-native Apps mit Public Cloud Services und lassen Sie sie überall laufen - in der Public Cloud oder auf Ihren Systemen vor Ort.

Teilen

Mehr dazu

[NEWS] Addressing the Massive Cybersecurity Skills Gap: Where Do We Begin?

23. Mai 2018

According to a recent report, there are an estimated 350,000 open cybersecurity jobs in the U.S. What are our options for addressing this massive gap? The post Addressing the Massive Cybersecurity Skills Gap: Where Do We Begin? appeared first on Security Intelligence.

Teilen

Mehr dazu

[NEWS] Spotlight Your Data Within Shadow IT

22. Mai 2018

A managed cloud access security broker (CASB) can help organizations gain visibility into shadow IT by monitoring all data transferred between the cloud and on-premises infrastructure. The post Spotlight Your Data Within Shadow IT appeared first on Security Intelligence .

Teilen

Mehr dazu

[NEWS] Can a Cognitive-Powered Security Intelligence Platform Bring Your SOC Up to Speed?

21. Mai 2018

Without cognitive insights, a security intelligence platform does little to ease the pressure on short-staffed security operations center (SOC) teams to analyze massive volumes of threat data. The post Can a Cognitive-Powered Security Intelligence Platform Bring Your SOC Up to Speed? appeared ...

Teilen

Mehr dazu

IBM Cloud Infrastruktur: Geben Sie einem unserer virtuellen oder Bare-Metal-Server eine Chance und sparen Sie viel Geld!

IBM Cloud Infrastruktur: Geben Sie einem unserer virtuellen oder Bare-Metal-Server eine Chance und sparen Sie viel Geld!

16. März 2018

Sie erhalten 60 Tage lang 50% auf unseren Listenpreis für ausgewählte virtuelle Server- und Bare-Metal-Server-Angebote. Das ist Ihre Chance, eine Vielzahl von IBM Cloud-Infrastrukturangeboten auszuprobieren.

Teilen

Mehr dazu

Echte Power für künstliche Intelligenz in Unternehmen: die neuen POWER9 Server von IBM

Echte Power für künstliche Intelligenz in Unternehmen: die neuen POWER9 Server von IBM

20. Februar 2018

IBM Power Systeme bieten eine innovative Plattform für klassische Anwendungen, Cloud-Umgebungen und kognitive Anwendungen zu einem überraschend erschwinglichen Preis.

Teilen

Mehr dazu

Wie schützen Sie Ihr Unternehmen vor Ransomware?

Wie schützen Sie Ihr Unternehmen vor Ransomware?

7. Dezember 2017

Erfahren Sie in unserem Webinar, worauf es beim Schutz vor Angriffen mit Verschlüsselungssoftware ankommt.

Teilen

Mehr dazu

Einfaches Management mobiler Endgeräte

9. September 2016

Schützen und verwalten Sie Ihre mobilen Geräte, Apps und Inhalte mit IBM MaaS360. Jetzt kostenlos testen!

Teilen

Mehr dazu

[NEWS] Achieving GDPR Compliance: The Spark That Will Light a Fire of Change

17. Mai 2018

A recent survey conducted by IBM Security and the IBM Institute for Business Value found that many organizations around the world are embracing GDPR compliance as an opportunity for innovation. The post Achieving GDPR Compliance: The Spark That Will Light a Fire of Change appeared first on ...

Teilen

Mehr dazu

[NEWS] Playing It Smart for Data Controllers and Processors

15. Mai 2018

Organizations preparing for GDPR should reach out to their third-party vendors to clearly define the roles, expectations and responsibilities of data controllers and processors. The post Playing It Smart for Data Controllers and Processors appeared first on Security Intelligence.

Teilen

Mehr dazu

[PODCAST] Cloud Data Security Trends, Challenges and Best Practices

14. Mai 2018

Many companies today are moving to the cloud, while others are expanding their cloud deployment to public, private, hybrid or even multi-cloud scenarios. In this podcast, Heidi Shey of Forrester Research offers tips for organizations facing the challenges of cloud transformation.

Teilen

Mehr dazu

[NEWS] How to Hack a Mobile App: It's Easier than You Think!

14. Mai 2018

How hackers are attacking binary code and mobile app vulnerabilities, and what you can do about it.

Teilen

Mehr dazu

[NEWS] WHOIS Behind Cyberattacks? Under GDPR, We May Not Know

10. Mai 2018

The goal of the European Union’s General Data Protection Regulation (GDPR) is, among other things, to standardize data protection laws applicable to EU data subjects. Aimed at enhancing privacy protection, the enforcement of the regulation becomes effective on May 25. GDPR’s implementation on an ...

Teilen

Mehr dazu

[NEWS] Data Privacy Regulations: Ensuring Mobile Data Protection in Light of...

8. Mai 2018

Organizations in every industry, from banking to retail, healthcare and more, are required to apply mobile data protection rules set by governments that impose massive fines in cases of noncompliance. Until the early 2000s, it was simpler to control data flows because information was mostly acces...

Teilen

Mehr dazu

[NEWS] Debate Club: Comparing the Merits of Enterprise Mobility Management and...

4. Mai 2018

For IT and security leaders, the ability to manage devices, apps and content are critical to end-user productivity and the protection of corporate information. There are two popular methods for doing this across smartphones, tablets, laptops and servers. For mobile devices, the technology is most...

Teilen

Mehr dazu

[NEWS] Why You Need New Mobile Security Best Practices for Business Travel

3. Mai 2018

In recent years, the risks associated with passing through an airport have changed dramatically. This demands a complete rethink about mobile security best practices for international travel. The post Why You Need New Mobile Security Best Practices for Business Travel appeared first on Security I...

Teilen

Mehr dazu

[VIDEO] Transform Your Application Security Testing & Empower Risk Management

[VIDEO] Transform Your Application Security Testing & Empower Risk Management

To protect your organization from potential fines, audit failures and brand damage, you need to abandon the legacy check-box compliance approach and pursue an active Application Security risk management program that’s supported by your executive management team. Access our free trials of IBM Appl...

Teilen

Jetzt ansehen

[NEWS] Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud,...

30. April 2018

Cybercriminals use DoS and DDoS attacks to distrupt services and take down networks and applications by sending overwhelming volumes of malicious traffic to target systems. The post Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 1 appeared first on Security Int...

Teilen

Mehr dazu

[WEBINAR] Selecting and Securing Your Enterprise Android Devices

27. April 2018

Let the pros of IBM MaaS360 and Google help you effectively embrace all things Android in the enterprise. Join us on Thursday, May 03, 2018 at 11:00 AM Eastern Daylight Time for our webinar "Selecting and Securing Your Enterprise Android Devices".

Teilen

Mehr dazu

[NEWS] Protecting Your Employees’ Home IT From Cyberthreats

26. April 2018

Helping employees protect their home IT reduces enterprise security risks and helps security leaders better safeguard corporate data. The post Protecting Your Employees’ Home IT From Cyberthreats appeared first on Security Intelligence.

Teilen

Mehr dazu

[NEWS] RSAC 2018 in Review: Highlights, Key Sessions and Emerging Industry Trends

25. April 2018

At RSAC 2018, countless security experts and practitioners gathered in San Francisco to talk about emerging threats and how the cybersecurity industry can prepare to meet evolving challenges. The post RSAC 2018 in Review: Highlights, Key Sessions and Emerging Industry Trends appeared first on Sec...

Teilen

Mehr dazu

[NEWS] Don’t Be Held for Ransom: Five Strategies to Secure Healthcare Data Against...

24. April 2018

Basic best practices, such as backing up data, patching vulnerable systems, segmenting networks, whitelisting apps and training employees, are the keys to protecting healthcare data from ransomware. The post Don’t Be Held for Ransom: Five Strategies to Secure Healthcare Data Against Cyberattacks ...

Teilen

Mehr dazu

[NEWS] Women in Security: Perspectives on Inclusion, Issues and Progress From the RSA Conference 2018

23. April 2018

At the RSA Conference 2018, industry leaders gathered to discuss issues surrounding women in security, including the key role of female IT professionals in closing the cybersecurity skills gap. The post Women in Security: Perspectives on Inclusion, Issues and Progress From the RSA Conference 2018...

Teilen

Mehr dazu

[NEWS] As Cyber Risk Escalates, the C-Suite Must Take Action

20. April 2018

As long as C-suite executives believe that cybersecurity is an IT issue, they will remain disengaged from the solutions and their role in supporting a robust cyber risk management strategy. The post As Cyber Risk Escalates, the C-Suite Must Take Action appeared first on Security Intelligence.

Teilen

Mehr dazu

[VIDEO] Marc van Zadelhoff Keynote Address at RSA

20. April 2018

RSAC keynote with Marc van Zadelhoff — General Manager of IBM Security. Watch it online here: #RSAC

Teilen

Mehr dazu

Zu kostenlosen Webinaren anmelden

Zu kostenlosen Webinaren anmelden

11. April 2018

Lernen Sie in interaktiven Webinaren mehr über IT-Lösungen aus den Bereichen Cloud, Security, Analytics, IoT und mehr. Filtern Sie einfach nach Thema und Sprache um eine Übersicht über die für Sie relevanten Webinare zu erhalten.

Teilen

Mehr dazu

Webinar Recording: Was wir von Raubrittern über Hacker lernen können - Einführung in SIEM

Webinar Recording: Was wir von Raubrittern über Hacker lernen können - Einführung in SIEM

Eine Einführung zum Thema SIEM – Security Incident and Event Management vom 27. Oktober 2015.

Teilen

Jetzt ansehen

[VIDEO] Threat Hunting: The human element

[VIDEO] Threat Hunting: The human element

Organizations need to start proactively protecting their IT environments. Threat hunting is a process combining automation and human analysis for early detection and remediation of cybersecurity attacks. The knowledge and experience of threat hunters play a very important role in ...

Teilen

Jetzt ansehen

E-Mail an diesen Ansprechpartner

Die mit einem Stern (*) markierten Felder müssen zum Abschließen dieser Transaktion ausgefüllt werden.