Home

Think

Security

Security and identity
Abstract representation of Think logo

Featured

Unpack the many and varied types of cybersecurity threats organizations face today

Types of cyberthreats

Security and AI

Understand the tech behind the evolving technologies in security and identity

AI in Cybersecurity

Learn how AI acts as a force multiplier to help you address security threats more effectively.

Explore how to use generative AI to mitigate risks

Explore three things CEOs need to know and three things they need to do now to apply generative AI to cybersecurity.

How to establish secure AI+ business models

Consider taking into account these seven best practices to prepare for a secure deployment of AI across your environments as its adoption grows and innovations evolve.

AI and automation for cybersecurity

Explore how security leaders are adopting AI-powered cybersecurity solutions to boost visibility, relieve pressure on security teams and drive productivity across their security operations.

Articles

Get the latest insights and build on your knowledge from our blogs and explainers on sustainability

View all security articles
Security AI and automation for protecting against data breaches

Read how AI and automation can help the retail and consumer goods industries reduce the impact of a cybersecurity data breach—financially and beyond.

What is phishing?

Uncover how phishing tricks users into divulging sensitive data, downloading malware, and exposing themselves or their organizations to cybercrime.

What is cybersecurity?

Stay informed about cybersecurity technology, types of threats and best practices to protect your critical systems and sensitive information from cyberattacks.

What is threat management?

Learn how cybersecurity professionals use a threat management system to prevent cyberattacks, detect cyber threats and respond to security incidents.

What is CAPTCHA?

Discover how CAPTCHA , or "Completely Automated Public Turing Test” , authenticates users as humans to prevent threats posed by malicious bots.

What is malware?

Learn how malware or “malicious software", such as ransomware, Trojan horses and spyware can harm computer systems or their users by compromising data security.

What is SIEM?

Find out how SIEM software helps organizations recognize and address potential security threats and vulnerabilities before they disrupt business operations.

What is cloud security?

Secure your cloud environment with cloud security, a collection of procedures and technology, to address external and internal threats to business security.

Strengthen your security intelligence 


 

 

Stay ahead of threats with news and insights on security, AI and more, weekly in the Think Newsletter. 


Subscribe today

Research reports

Read our research reports to help steer enterprise security

View all technology and security, CIO research reports

Videos

Learn the fundamentals and trending topics in security from our explainer videos

View the cloud security playlist
AI in Cybersecurity

Learn how AI acts as a force multiplier to help you address security threats more effectively.

What is SOAR?

In this video, Jeff "The Security Guy" explains the need to have a strategy AND the right tools for handling security incidents, including so-called "black swan" events.

Phishing Explained

Security expert Jeff Crume explains the attackers' strategy, whether it's phishing, spearfishing or whaling -- and how to avoid falling for their traps.

Understand the MITRE ATT&CK in terms of “tactics, techniques and procedures (TTPs)”, and “people, process and technology (PPTs)”, and how to defend against attacks.

Sort through alerts with Jaqueline Lehmann using a SIEM system to correlate data from multiple sources and find accurate, high-fidelity alerts.

Watch how Jeff Crume, IBM Distinguished Engineer, describes the many methods that bad guy/hackers use that you should know about so you can protect yourself.

Watch Kevin Skapinetz, Vice President of Strategy & Product Management, IBM Security, discuss using AI to quickly defend against cyberattacks as speed is important in cybersecurity.

The power of AI: Security

Security AI and automation technologies enable organizations to stay ahead of cyber threats through faster incident detection and response.

Courses

Build your skills with our security courses

Build your skills Security training Access over 100 online courses by purchasing either an individual or multi-user digital learning subscription to expand your skills at one low price. Explore offered training

IBM Research for security

IBM Research is a group of scientists and researchers around the globe who deeply believe in the power of the scientific method to invent what’s next for IBM, our clients and the world. Explore our work and publications for security.

Explore IBM Research

How IBM can help

IBM Security® MaaS360®

Manage and secure your mobile workforce with AI-driven unified endpoint management (UEM) and threat defense.

Manage your mobile workforce
IBM Security® Guardium

Enable wide visibility, compliance and protection throughout the data security lifecycle.

Uncover vulnerabilities
IBM Security® Verify

Protect and manage customer, workforce and privileged identities across hybrid cloud with identity and access management (IAM) solutions.

Protect identities