5 Ways Organizations Are Recovering Their Data
Data loss is getting worse. Businesses and other organizations are losing their content 24/7 throughout the globe. Cyberattacks on elections, intelligence agencies and the highest government levels make the news every day. Attacks on big business – Target, Sony and more – threaten the identities of employees, customers and stakeholders. Yet, small businesses have become the easiest data bank to rob. The Size Of The Problem What you see in recent research is some confusion about the size of the problem, but it's bad. And,... [More]
|
2FA Architecture — The privacy threat
2FA Architecture — The threat to privacy of modern Internet Are we secured with multiple layers of security? There is a huge initiative from industry leaders to double secure user account in order to regain access in case of lost password. That’s perfectly fine. It helps you recover credentials, but this study shows it opens a hole that might be one of the largest security and privacy threats. Both private users and enterprises employs services such as Google, Facebook, Twitter, LinkedIN and others and give trust to... [More]
Tags:  security security-intelligence |
How Cybersecurity is Changing in 2017
“Cybersecurity” has become an increasingly vague and generalized term. The concept of cybersecurity encompasses every angle from which infiltrators and others with malicious intentions can make their mark. From cyber espionage and hacking electronic medical records to keylogging and trojan viruses, the term cybersecurity does not adequately capture the extent to which threats have evolved. But there is some good news: 2017 has seen new technologies prove to be effective solutions. Most important, we're seeing new philosophies... [More]
|
TUC Newsletter- August 2013
Are you a member of the TUC? IN THIS ISSUE Global Group Updates Member Interview TUC Webcasts Webcast Replays User Group Meetings Sponsors MEMBER INTERVIEW TUC Member Interview Todd Loveday , Maximo Project Manager, URS Corporation Click here to view other TUC Member Interviews WEBCAST REPLAYS Check out the replays of July's TUC webcasts! Webcast Replay Monitoring of Your DataPower Multi-Tenant Environment Webcast Replay Demonstrate the Value of Your Maintenance Department by... [More]
|
Integrated Service Management Library
IBM wants to increase the value of your existing products by bringing you more content through the Integrated Service Management Library . Please take a moment to help us understand what kind of content would be most useful to you by answering this very brief survey.
|
Audit, Surveillance, and Customer Service
How a pair of missing pants taught me about audit, surveillance, and customer service and the implications for technology controls. [Read this post.]
Tags:  security surveillance audit privacy |
TUC Webcast: IBM’s Next Generation of IAM solutions – What You Need to Know Now
Don’t miss
the next Tivoli User Community webcast: IBM’s Next Generation of IAM solutions
– What You Need to Know Now on December 12, 2012 at 11:00 am ET, USA. Reserve Your Webcast Seat Now Overview: In Q4 2012, IBM Security completely
revamped the Identity and Access Management portfolio to address today’s
advanced security threats. Familiar products such as Tivoli Identity Manager
and Tivoli Access Manager for e-business have new IBM Security names and
exciting new capabilities. Plus we’ve announced brand new solutions... [More]
Tags:  ibm security user iam tivoli solutions tuc webcast storage community |
The 2012 IBM Tech Trend Report |
I wish there was an authentication algorithm like this
There was a time,
when logging in to your bank account was a simple matter of entering a user ID,
entering a password, and accessing your account. Similarly, getting
cash from an ATM, just entailed inserting your card, entering your PIN code,
and grabbing the cash. Not any more. When you access your
bank’s web page, something horrible, called ‘malware’, sits on your PC,
remembering every character you type, and sending them all to its sociopathic
owner, so that he can later rob you. When you visit your ATM, a hidden camera
records the... [More]
Tags:  authentication security online atm banking identity |
Skype Account Hijack Attack: Lessons Learned
What kinds of security controls could have prevented the Skype account hijack attack? Can we do anything except rely on white hat penetration testing? [Read this post.]
Tags:  security skype pentesting |
Legitimate Security Through Obscurity
There are times when “security through obscurity” is a perfectly legitimate security control tactic, especially against opportunistic attackers. [Read this post.]
Tags:  security obfuscation |
Payment Card Fraud and a Checking Account DMZ
Could the IT DMZ be used as a model for controlling payment card fraud and help protect against skimming attacks like those at Barnes and Noble? [Read this post.]
Tags:  pci fraud payment-card security |
Social Engineering Attack Demographics
Our common stereotypes of social engineering attacks don’t match up to the latest data in the Verizon 2012 Data Breach Investigations Report. [Read this post.]
Tags:  social-engineering security |
Protecting the Password File |
The 2012 Global Reputational Risk and IT Study
The 2012 Global Reputational Risk and IT Study calls into question the assumption that IT security incidents have only temporary impact on reputation. [Read this post.]
Tags:  erm security reputation risk |
IBM Security zSecure suite
News about the IBM Security zSecure suite is regularly posted to SMC - System Z . Recent news of particular interest from a compliance perspective: IBM Security zSecure Audit integration with QRadar SIEM
Tags:  mainframe z/os security servicemanagementconnect q1labs racf qradar acf2 siem db2 systemz ism cics topsecret zsecure |
Tivoli Access Manager V6.0 Videos
IBM Tivoli Access
Manager for e-business is a single sign-on (SSO) solution that authorizes and
authenticates user access to Web and other hosted applications. Tivoli Access Manager’s software is a highly scalable user
authentication, authorization and Web SSO solution for enforcing security
policies over a wide range of Web and application resources. It centralizes
user access management for online portal and business initiatives. See the support and services Tivoli Access Manager V6.0 has for you and your business needs in the... [More]
Tags:  tivoli access iea manager |
developerWorks security site launched
About an hour ago we launched the new developerWorks security site .
I'm excited to have this corner of developerWorks to pull together all
of the existing security articles on dW in one place. But more
importantly we're looking forward to producing a steady stream of how-to
articles and videos on producing secure code and securing your IT
operations at the new developerWorks security site. The
developerWorks security site has two key parts to its "Practices" area.
The first section is devoted to secure software... [More]
Tags:  developerworks security dw |
Privilege Escalation at the Low End
“All
or nothing” authentication for low end privilege escalation hampers
end-user adoption due to the inconvenience associated with
authentication. [Read this post.]
Tags:  authentication security mobile |
Amazon and Apple Account Hack: A Trifecta of Security Flaws
The
recent Amazon / Apple account hack shows three examples of the same
type of fundamental security flaw: using personal information as a
credential. [Read this post.]
Tags:  amazon strong-authentication pwdreset apple security authentication |