September 26, 2014 Shellshock: Where the Bash Bug Could Hit the Hardest 2 min read - The Bash bug, a new vulnerability known as Shellshock, could have a sizable impact on an untold number of devices, according to security experts.
Risk Management September 23, 2014 How to Improve Asset Management for Risk Assessment and Control 2 min read - Asset management can be improved when responsibilities are shared and the inventory system is established, frequently updated and quickly actionable.
Intelligence & Analytics September 17, 2014 How the Internet of Things (IoT) Is Changing the Cybersecurity Landscape 3 min read - Privacy is a significant concern in the Internet of Things. It is already changing the security landscape and exponentially expanding the attack surface.
X-Force August 25, 2014 Why Heartbleed Still Matters: Hindsight in the Age of Pervasive Exploits 4 min read - The latest IBM X-Force Threat Intelligence Report discusses the aftermath of the Heartbleed vulnerability, what organizations can learn and improve upon.
Intelligence & Analytics August 18, 2014 3 Sure-Fire Tips for Navigating the Chaos of the Information Security Industry 3 min read - The chaos of Black Hat is just like the chaos of the information security industry. How can one decide which security company to partner with?
Intelligence & Analytics August 15, 2014 Black Hat 2014: Where the Internet of Things Meets Reality 4 min read - Black Hat 2014 illuminated the vulnerabilities of the Internet of Things, according to two IBM researchers who attended the conference.
August 13, 2014 Data Security Gets a Wake-Up Call From Blackphone 2 min read - Blackphone offers a robust security and privacy suite, which is handy for sophisticated users but not a complete solution for all mobile users.
Software Vulnerabilities August 5, 2014 Apache Cordova Vulnerability Discovered: 10% of Android Banking Apps Potentially Vulnerable 8 min read - The IBM Security X-Force Research team has uncovered a serious vulnerability that affects many Android applications built on the Apache Cordova platform.
Software Vulnerabilities June 30, 2014 Are Vendors Doing What Is Needed to Mitigate Security Vulnerabilities? 3 min read - When selecting an Information Technology (IT) vendor, it is important to consider what the vendor does to mitigate security vulnerabilities.
Application Security June 24, 2014 So Many Vulnerabilities, So Little Time 5 min read - Getting application security vulnerabilities under control is harder than it sounds. Follow these four steps to help your company get started.