Cloud Security August 22, 2017 Shrink Your Enterprise Cloud Computing Security Concerns With a Cloud Vendor Risk Management Program 4 min read - Security professionals need a layered, end-to-end life cycle approach to managing the security risks associated with enterprise cloud computing.
Data Protection August 22, 2017 Leading by Example: Security and Privacy in the Education Sector 5 min read - Today's students must grapple with security and privacy issues, such as identity theft and financial fraud, that could affect them well past graduation.
Mainframe August 15, 2017 The Power of Pervasive Encryption 3 min read - The new z14 mainframe from IBM includes a revamped coprocessor that enables pervasive encryption of both at-rest and in-transit data.
Cloud Security August 11, 2017 Cloud Security and the New Cold War: Corporate Strategies for Winning Digital Battles 3 min read - Companies and governments around the world must test their cloud security capabilities to keep sensitive data safe from hacktivists and cyber enemies.
August 10, 2017 UK Data Protection Bill Introduces Post-Brexit Security Plans 2 min read - Brexit is coming, and the British government recently released a Statement of Intent regarding its new U.K. data protection bill.
Data Protection August 10, 2017 Seeing Data Security Breaches With Your Own Eyes 3 min read - The new Data Insight feature for IBM Security Guardium enables analysts to more effectively monitor database access during security breaches.
Mainframe August 4, 2017 Pervasive Encryption Simplifies Mainframe Security 2 min read - With the new pervasive encryption feature in the IBM z14 mainframe server, customers can protect data without changing or adjusting applications.
August 4, 2017 DOJ Issues Framework for Vulnerability Disclosure Programs 2 min read - The Department of Justice (DOJ) offered guidance on vulnerability disclosure programs, which will assist organizations in navigating legal issues.
Fraud Protection August 1, 2017 To Fight Cybercriminals, Follow the Money Trail 2 min read - Most cybercriminals are after money. To safeguard your network from money-hungry fraudsters, you need to know where your most valuable assets are stored.
Data Protection July 31, 2017 Mainframe Data Is Your Secret Sauce: A Recipe for Data Protection 2 min read - If mainframe data is your secret sauce, then data activity monitoring should be a key part of the data protection strategy defending your secret recipe.