
Blogs
Blogs
Matching:
ibm_security
X

Display: |
A Zen Approach to Security Community Blog
dwmigration2
Tags:
ibmsecurity
security
ibm_security
networksecurity
virtual-environments
vikash-abraham
network
host
network-security
6,714 Views
Post by Vikash Abraham , Product Marketing Manager for IBM Security Solutions What Zen, Ancient Wisdom and Infrastructure Security Have in Common Ancient wisdom continues to amaze me, and this struck me: Isn't there a strong correlation between ancient...
from Blog: IBM Redbooks Software Blog
Modified on by dwmigration2
|
|
Infosecurity Europe 2013: Day 3 Thoughts Community Blog
dwmigration2
Tags:
security
mainframe
ibm_security
qradar
guardium
incident-response
infosec13
auditing
ibmsecurity
ips
database-security
ibm-security
security-requirements
risk
infosecurity-uk
infosecurity-europe
siem
infosececurity
infosec
risk-assessment
san
security-intelligence
securie-coding
7,801 Views
As the third day came to a close on Infosecurity Europe and our stand is now slowly being taken down, I wanted to provide some key highlights of the whiteboarding sessions that happened live on our interactive graffiti wall. How to Protect your Crown Jewels...
from Blog: IBM Redbooks Software Blog
Modified on by dwmigration2
|
|
Infosecurity Europe 2013: Day 2 Thoughts Community Blog
dwmigration2
Tags:
qradar
ibm-security
security-intelligence
ibmsecurity
infosec
europe
tom-kendall
ibm_security
infosec13
security
infosecurity
mobile-security
7,029 Views
IBM Security Systems had another great day at Infosecurity Europe, with good attendance at our stand for the hourly interactive graffiti whiteboarding sessions, which covered all the hottest security topics. In our workshops we had four successful sessions,...
from Blog: IBM Redbooks Software Blog
Modified on by dwmigration2
|
|
Infosecurity Europe 2013: Day 1 Thoughts Community Blog
dwmigration2
Tags:
infosecurity-europe
x-force
infosec
security-intelligence
infosecurity
vulnerabilities
byod
xforce
ibmsecurity
ibmxforce
big-data
ibm_security
ibm-security
ibm-x-force
security
europe
tom-kendall
infosec13
7,112 Views
Wow, the end of a great first day at Infosecurity Europe . Our stand was very bright and impactful and with our industry experts, business partners and action packed agenda, it has been truly engaging day! We had four workshops across the day and below are the...
from Blog: IBM Redbooks Software Blog
Modified on by dwmigration2
|
|
New report analyzes and explores latest security threats and trends Community Blog
dwmigration2
Tags:
x-force
data
vulnerabilities
ibmmobile
report
ddos
attackers
ibm-xforce
ibm_security
security-intelligence
xforce
security
ibmxforce
hackers
ibm
java
ibm_mobile
information-security
ibmsecurity
ibm-mobile
mobile
it
ibm-security
research
7,474 Views
NEW! IBM X-Force 2012 Annual Trend and Risk Report Twice a year since the late 1990s, IBM�s X-Force Research and Development team releases a trend and risk report including content collected from dozens of thought leaders across the company. Its...
from Blog: IBM Redbooks Software Blog
Modified on by dwmigration2
|
|
You may have ‘Big Data’ and not know it… can you protect it? Community Blog
dwmigration2
Tags:
ibmsecurity
data
security
big-data
ibm_security
bigdata
security-intelligence
protect
ibm-security
7,605 Views
You may have �Big Data� and not know it� can you protect it? To many security executives the word �Big Data� seems to being something that someone else has and thus not applicable to ones own enterprise. Many Security...
from Blog: IBM Redbooks Software Blog
Modified on by dwmigration2
|
|
System z continues to reign as the Ultimate Security Platform Community Blog
dwmigration2
Tags:
guardium
zsecure_suite
tom_turner
ec12
ibm_security
optim
racf
qradar
encryption_key_management
iod
infosphere_guardium
6,012 Views
This post is an excerpt from the IBM Mainframe Insights blog found at http://ibm.co/SystemZBlog and was written by Tom Turner, VP of Marketing for IBM Security. Read the full post here: http://ibm.co/Tb4Ibl . "The mainframe has a rich and proven legacy of...
from Blog: IBM Redbooks Software Blog
|