ChannelLife New Zealand - Industry insider news for technology resellers

IBM Security stories - Page 2

Thinkstockphotos 503426092

IBM Security collaborates to launch anti-DNS tracking service

Tue, 28th Nov 2017
#
uc
#
ibm security
#
tablets
Quad9 Domain Name Service protects users from accessing malicious internet sites that are known to steal information and other harmful activities.
Security red

Carbon Black and IBM Security tighten partnership with rapid response tool

Tue, 17th Oct 2017
#
hack
#
ibm security
#
carbon black
An expanded partnership between Carbon Black and IBM Security aim to provide increased cyberattack visibility and accelerated incident response times.
Thinkstockphotos 175005807 1

Spammers' work cycles: Mon-Fri with lazy weekends, says IBM X-Force

Mon, 28th Aug 2017
#
malware
#
cybersecurity
#
spam
Attackers using tools such as Dridex and Qakbot spam employees through malicious mail at times when victims are most likely to open all incoming mail.
Thinkstockphotos 653513498

IBM X-Force takes on IoT security across connected devices - and vehicles

Wed, 26th Jul 2017
#
iot
#
ibm
#
ibm security
IBM X-Force researchers are expanding their focus to include vehicle and IoT security in response to a growing market for data connectivity in vehicles.
Thinkstockphotos 531430677

TrickBot malware ramps up attacks against ANZ financial firms

Mon, 1st May 2017
#
malware
#
cybersecurity
#
ibm security
Attackers behind the TrickBot Trojan have been taking their tactics to the next level, researchers from IBM X-Force have uncovered.
Thinkstockphotos 485298714

IBM Security X-Force reports 'record' 556% increase in breaches

Thu, 30th Mar 2017
#
malware
#
ransomware
#
breach prevention
IBM Security's 2017 X-Force Threat Intelligence Index has uncovered a 556% increase in the number of breached records in the past year.
Secret

Cyber security: more engagement vital

Fri, 19th Feb 2016
#
cybersecurity
#
ibm security
#
cyber attacks
IBM Security says many leaders across the C-suite are confused about who the true cybersecurity adversary really is, and how to combat them.