- Classificar por:
- Data
- Título
- Curtir
- Comentários
- Visualizações ▼
A functional view of the XGS 5100 IPS Appliance
|
|
Visits (10775)
We've just posted an new article on developerWorks, "IBM
Marcações:  xgs ips infrastructure |
||||||||||||||||||||||||
OWASP highlights binary data protection in mobile environments
You might also be interested in.... Defending against malware: A holistic approach to one of today’s biggest IT risks This white paper will examine the changing strategies that malware has employed in recent years, explain the typical sequence of events that occurs during an attack, and describe how an integrated defense can help keep the enterprise safe from these advanced persistent threats.
Download Defe Marcações:  owasp mobile arxan security |
||||||||||||||||||||||||
Three years of IT security incidents in one picture
|
|
Visits (8870)
If you want see a concise history of the past three years of IT Security incidents, you need to download the IBM As you can tell by the change in colors as you scan the graphic from left to right, the industry is starting to get a handle on DDoS atacks and SQL injection attacks, while attack types based on physical access to machines and distribution of malware are becoming more common. As noted in the report: "The declines in vulnerabilities demonstrated at the end of 2013 in both XSS and SQL injection could indicate that developers are doing a better job at writing secure web applications, or possibly that traditional targets like content management systems (CMSs) and plug-ins are maturing as older vulnerabilities have been patched. As noted, XSS and SQL injection exploitation continue to be observed in high numbers, indicating there are still legacy systems or other unpatched web applications that remain vulnerable. This is expected, considering there are many thousands of blogs and other websites run by individuals who may not have the skills or awareness to update to later versions of their platform or framework." The other thing to note in the graphic is that the overall number of incidents overall impact of IT security incidents aren't exactly going down, so it seems there is still plenty of job security in the IT security arena in 2013. Marcações:  threat-intelligence risk-management #security security ibmxforce threat-assessment security-intelligence |
||||||||||||||||||||||||
How much does a data breach cost your company?
|
|
Visits (8775)
That's why IBM has sponsored the Ponemon Institute's 2014 Study on the Cost of Data Breaches. This far reaching study is based on 1690 interviews across 10 countries and 16 sectors and is based on actual experiences of companies instead of could-have-happened theoretical discussions. The Ponemon Institute has released both a global report and 10 country specific reports:
One of the most eye-popping charts in the report analyzes the reported data to show the clear relationship between the size of the breach and its cost: Keep in mind that this is not some hypothetical computer model. This is a regression based on the actual interviews and their reported data.
The 2014 Ponemon Cost Of Data Breach study is must reading for anyone needing to build a business case for protecting against data breaches. Marcações:  security data-protection ponemon data-breach #security data |
||||||||||||||||||||||||
IBM Security - Support Lifecycle Resources
|
|
Visits (8548)
Short URL for this post: http Resources
|
||||||||||||||||||||||||
SQL Injection attacks: A Step by Step Guide :-)
|
|
Visits (8002)
Greetings,
I'm proud to announce we've just published "Fig Marcações:  security vulnerability-management appscan application-scanning #security sql-injection sql |
||||||||||||||||||||||||
IBM Multi-Factor Authentication for z/OS and infrastructure support from RACF and zSecure
|
|
Visits (7913)
IBM z/OS Security Server Resource Access Control Facility (RACF) provided enabling infrastructure updates for z/OS V2R1 and V2R2.
IBM Security zSecure suite provided supporting updates for zSecure 2.1, 2.1.1, and 2.2.
Multi-Factor Authentication raises the level of assurance of mission-critical systems by requiring authentication with multiple factors during the logon process.
Each authentication factor must be from a separate category of credential types: 1) Something you know (e.g. a password or PIN code), 2) Something you have (e.g. an ID badge or a cryptographic key), 3) Something you are (e.g. a fingerprint or other biometric data).
More details can be located through this blog entry by Jeroen Tiggelman on the Service Management Connect - System z blog.
You might also be interested in the zSec
Marcações:  racf zsecure z/os security mfa iam z_systems infrastructure mainframe |
||||||||||||||||||||||||
New IBM Security zSecure suite and solutions overview
|
|
Visits (7715)
IBM IBM IBM IBM IBM IBM IBM
... and the following solutions
IBM
Please refer to this blog entry on System z Management for details on the solutions.
The zSecure 2.1.1 release is for the z/OS operating system. The z/VM product IBM
All zSecure products support RACF. zSecure Audit and Adapters for QRadar SIEM support CA-ACF2 and CA-Top Secret. zSecure Alert supports CA-ACF2.
You might also be interested in this article on 50 years of mainframe security.
Edit: Updated zSecure for z/VM release from 1.11.1; 1.11.2 became available on March 13, 2015. Edit: The latest zSecure for z/OS release is zSecure 2.3.0. Marcações:  #security topsecret system_z cics iam security-intelligence mainframe50 security mainframe qradar zsecure infrastructure z/vm z/os siem acf2 racf |
||||||||||||||||||||||||
Finger biometric authentication "touches" IBM Security Access Manager
|
|
Visits (7684)
BIO-key International's fing You can learn more about ISAM and BIO-key products and technologies. at the BIO-key International community on developerWorks.
Marcações:  biokey ibm-security bio-key fingerprint ibm_security_access_manag... authentication security isam biometrics |
||||||||||||||||||||||||
XGS and QRadar integration
|
|
Visits (7493)
Marcações:  security xgs qradar |
||||||||||||||||||||||||
Video Tutorials on InfoSphere Guardium PoliciesSee below for an announcement from Kathryn Zeidenstein about some new video tutorials on InfoSphere Guardium policies --Calvin
Hi community members Back in 2011 or so the lab services team had done a LotusLive education session on policies that was very well received. I have taken the first of these presentations and broken it into 4 modules that are now hosted on the InfoSphere Guardium YouTube channel.
You can find links to all 4 of the modules on this new page on the InfoSphere Guardium community wiki. http Here are the direct links:
Break out the popcorn!! Have a great weekend. Kathy Z Marcações:  guardium security infosphere data-protection data |
||||||||||||||||||||||||
Build a front-end load balancer and failover reverse proxy with IBM Security Access Manager
|
|
Visits (7179)
The front-end load balancing function automatically assigns client requests to the appropriate reverse proxy server based on the specified scheduling algorithm. Moreover, the front-end load balancer provides stickiness or persistence for existing sessions, allowing incoming requests from the same client to be forwarded to the same server. A typical setup is two front-end load balancer servers and multiple reverse proxy servers. You might also be interested in.....
Download "Tolly Test Report: IBM Security Web Gateway Appliance."
Marcações:  access-control security proxy load-balancer reverse-proxy #security iam |
||||||||||||||||||||||||
IBM Security AMP 5100 and the OWASP Top 10
Tolly engineers evaluated the AMP 5100's effectiveness in blocking the most common threats as defined by OWASP. Tolly found the AMP5100 to be 100% effective in blocking in-line preventable attacks. Tolly specifically validated the AMP5100is able to prevent all forms of SQL injection attacks, XSS, and broken authentication attacks. The Tolly evaluation goes into more details about the AMP510's ease of use and performance characteristics.
You can download and read Marcações:  amp5100 ibmsecurity iam security access-manager |
||||||||||||||||||||||||
The "always on" QRadar appliance with NIC Bonding
|
|
Visits (6970)
From the abstract: "This article highlights the configuration necessary for bonding―or teaming―the Network Interface Card (NIC) for the QRadar Security Information and Event Management (SIEM) appliance. It addresses topics related to high availability of the QRadar SIEM appliances and is intended for administrators in charge of maintaining those appliances." You might also be interested in...
Protect your critical assets with an integrated, cost-effective approach to vulnerability assessments and risk management. Read this white paper to learn:
Download "Managing security risks and vulnerabilities." Marcações:  security qradar ibmsecurity #security network-security security-intelligence nic-bonding |
||||||||||||||||||||||||
New product announced: IBM Security zSecure Adapters for QRadar SIEM
|
|
Visits (6772)
This announcement includes a new product IBM More details about the various integrations between zSecure and QRadar SIEM can be found in this blog entry by Jeroen Tiggelman on the Service Management Connect - System z blog.
You might also be interested in what else is new
Marcações:  system_z zsecure racf infrastructure cics security-intelligence security #security acf2 db2 topsecret |