Monday, September 23, 2019
IBM Security

iOS 13 at Work, Part 1: Enabling Single Sign-On (SSO) and Distributing Custom Apps

Apple users of the world, 13 is your lucky number: iOS 13 has arrived! As expected, this new iteration of Apple’s mobile operating system comes with a slew of changes, both consumer-focused and enterprise-grade. How will iOS 13 impact your...
IBM Security

What Is Unified Threat Management? A Pragmatic Approach to Information Security

Organizations are spending on cybersecurity, but threat vectors continue to outpace corporate outlay. As noted by Tech Genix, 2019 will see a rise in everything from cryptojacking attacks and supply chain compromises, to the misuse of biometric data and...
IBM Security

How to Take Control of Your Privileged Accounts

Privileged access management (PAM) — also referred to as privileged account management — is the top cybersecurity project for chief information security officers (CISOs), according to Gartner. Why? Because privileged access carries significant risk, and all organizations deal with...
IBM Security

Night Vision: Navigating the Darknet for Improved Threat Intelligence

Chief information security officers (CISOs) and other security leaders have heard the term darknet — and typically avoid it with good reason. When used carefully and securely, however, it is an invaluable source of threat intelligence data. But what’s...
IBM Security

Speak Up! How a Graduate Security Architect Learned to Challenge the Status Quo

When asked recently how my role as a graduate security architect within cloud security services was going, my response was, “Really good! Working on a new bid. Wish I could tell you who the client is, but…” — pretending...
IBM Security

How Data Loss Prevention (DLP) Can Help Solve the Insider Threat Problem

Face it, insider threats happen. And odds are you are suffering a data loss, leak or theft even as you read this article. That’s a scary thought. Unfortunately, insider threats are so common that organizations deal every day with data...
IBM Security

The Future of Cybercrime: Where Are We Headed?

By 2024, the collective cost of data breaches will reach $5 trillion, according to a study by Juniper Research. The study predicted this astronomical amount will be the result of an increase in fines due, in large part, to...
IBM Security

Mobile Device Disposal: Best Practices for Burying BYOD Endpoints Without Risk

The circle of life is predictable and short for corporate-owned mobile devices. Aging devices are ideally retired before they become a security or productivity risk, wiped clean and recycled. Disposal is a natural, important part of endpoint management, but...
IBM Security

Your Users Aren’t the Weakest Link — They’re Integral to Your Security Program

As data breaches increase globally in both severity and frequency, business leaders are realizing that achieving better security outcomes requires a significant shift in the traditional mindset and approach. It is all too easy to point to examples of massive...
IBM Security

How to Select the Right IDaaS Vendor and Avoid Deployment Pain Points

Since the advent of the cloud, the number of -as-a-service solution offerings has exploded. But most businesses continue to operate with a mix of on-premises and cloud applications that need to be accessed by employees, customers and business partners....
IBM Security

The Art of Patch Management

Malware exists to exploit vulnerabilities discovered in software. Patches exist to fix those vulnerabilities. So why do so many vulnerabilities remain unpatched? Why is patch management so complicated? Sadly, security and IT professionals don’t live in a patch-everything-right-away fantasy land....
IBM Security

5 Things You Can Do After a Data Breach to Help Mitigate Cost

Protecting against a data breach is increasingly a complex problem for organizations — and the average cost of a data breach continues to rise, up to an average of $3.92 million in 2019 for those surveyed, according to the...
IBM Security

How Will Strong Customer Authentication Impact the Security of Electronic Payments?

Rapid changes in the payments industry, the meteoric rise of e-commerce and the constant threat of fraud have led the European Union (EU) to update its Payment Services Directive (PDS), which has regulated the electronic payment services industry since...
IBM Security

New Poll Shows Consumers’ Expectations on Data Privacy Evolve, But So Does Technology

Facebook last week called for help to source solutions to its privacy quandary. How do you protect users’ privacy while enabling access, portability and monetization? This call to action is an industrywide issue, and an important one: Facebook is...
IBM Security

10 Reasons Cyber Range Simulation Is Vital to Incident Response

Are you really prepared to respond to a cyberattack? You don’t want to discover halfway through a data breach that your incident response (IR) playbook cracks under pressure. Just 23 percent of organizations have a consistently applied cybersecurity response...
SC Magazine

Ning Wang – Offensive Security

Ning WangCEO Offensive Security Why Nominated: Ning Wang is a rising star has worked to break the boundaries in the security industry, so that people can see that anyone is capable of starting a career in cybersecurity and advancing it –...
SC Magazine

Dani Martínez – IOActive

Dani MartínezSecurity ConsultantIOActive Why nominated: Dani Martínez proved to be a self-starter, beginning his career in IT he soon developed an interest in cybersecurity and began taking online courses in his spare time. Martínez also dove write in and began a cybersecurity blog...
SC Magazine

Maurice Stebila – Harman, a Samsung Company

Maurice StebilaDigital Security,Compliance and Privacy OfficerHarman, a Samsung Company Why nominated: Maurice Stebila has spent more than 30 years in the automotive, manufacturing and financial services industry supporting two of the world’s largest companies – EDS/General Motors and Harman by Samsung...
SC Magazine

Ed Adams – Security Innovation

Ed AdamsPresident and CEOSecurity Innovation Why Nominated: A highly respected veteran of the cybersecurity industry, Security Innovation CEO Ed Adams has taken on several new leadership roles in the year or so. Last April, he was named to board of directors of...
SC Magazine

David Archer – Galois

David ArcherPrincipal scientistGalois Why Nominated: Archer, an advocate for preserving privacy of data even when it’s used in decision-making both within the U.S. at all levels of government as well as internationally, directs research in privacy-preserving information technologies. Profile:  David Archer is all...