data breach IBM governance, policies, protection deep web data governance compliant leak database security

IBM: Cost of a Data Breach Hits Another High

The average cost to an organization hit with a data breach reached a record high this year, though those companies are split on who they believe should foot the bill, according to ...
Security Boulevard
IBM Polar security bear

IBM Acquires Polar Security for Data Security Posture Management

IBM this week acquired Polar Security to add a data security posture management platform to its cybersecurity portfolio. Kevin Skapinetz, vice president of strategy and product management for IBM Security, said the ...
Security Boulevard

IBM’s Security QRadar Suite: Scalable as a Service Cyberthreat Solutions for Enterprises

“Scalability” is a commonplace concept among IT vendors and enterprise customers, but the means they use to achieve scalable performance have changed significantly over time. Not all that long ago, companies purchased ...
ransomware SaaS Security

IBM Security Finds Ransomware Attacks Take Less Than Four Days

IBM Security today published a report that found ransomware attacks, on average, can now be launched and completed in less than four days, down from two months previously. On the plus side, ...
Security Boulevard
IBM Steps Up to Showcase Unusual Security Competency

IBM Steps Up to Showcase Unusual Security Competency

| | Blog, IBM, News & Analysis, security, SIEM
Last week, IBM had an analyst briefing on its security efforts and, unsurprisingly, it was one of the most comprehensive I have ever seen. For much of the 80s and 90s, upcoming ...

Key Points from the IBM Cost of a Data Breach Report 2022

The volume and impact of data breaches have accelerated largely in 2022, which has contributed to many adverse effects for businesses. Tc highlights several updated factors that have generated great costs across ...

Interpreting the Key Points of The 2022 IBM i Marketplace Survey Results

This year marks the eighth edition of the popular IBM i Marketplace Survey Results. Each year, HelpSystems collects data about how companies utilize the IBM i platform and the IT enterprises it ...

Malware on IBM Power Systems: What You Need to Know

Malware – what are the threats? Malware can come from and in a variety of attack vectors. Besides using ‘traditional’ methods of spreading malware, adversaries can leverage more sophisticated methods to turn ...
IBM data breach The Economics of Data and Information

IBM Report Reveals Economic Impact of Data Breaches

IBM published a report today that suggested data breaches are starting to have a material impact on the cost of goods and services. An IBM analysis of data breaches that occurred in ...
Security Boulevard
Microsoft CrowdStrike HPE edge IBM attack surface ukraine CISA Log4j CISA BlackBerry IoT connected device Bluetooth

IBM to Acquire Randori to Provide More Cybersecurity Visibility

At the RSAC 2022 event this week, IBM revealed that it plans to acquire Randori, a provider of an attack surface asset analysis tool. Chris Meenan, vice president of product management for ...
Security Boulevard