Quantcast
Channel: Cybersecurity - IBM Blog
Browsing latest articles
Browse All 33 View Live

Authentication vs. authorization: What’s the difference?

Authentication and authorization are related but distinct processes in an organization’s identity and access management (IAM) system. Authentication verifies a user’s identity. Authorization gives the...

View Article


What is the vulnerability management process?

Modern enterprise networks are vast systems of remote and on-premises endpoints, locally installed software, cloud apps, and third-party services. Every one of these assets plays a vital role in...

View Article


How Krista Software helped Zimperium speed development and reduce costs with...

Successful businesses are embracing the power of AI to help streamline operations, generate insights, boost productivity and drive more value for clients. However, for many enterprises, the barrier to...

View Article

The next step in homomorphic encryption for Linux on IBM Z and LinuxONE

101 billion. That’s the number of data records compromised in 20201. This made 2020 a record-breaking year for data breaches – the cost per breach also hitting a record high with an average of $4.24...

View Article

Power makes it possible: experience the four pillars of success

How the IBM® Power® E1080 provides increased security, scalability, and resilience From time to time, we invite industry thought leaders to share their opinions and insights on current technology...

View Article


Automating workplace vaccination verification — a path out of the pandemic

Workplace vaccination mandates are coming for employers. In the United States, The Department of Labor’s Occupational Safety and Health Administration (OSHA) recently released a rule on requiring all...

View Article

Customer choice always drives innovation

Almost 35 years ago, if you needed a computing device to run business applications you had only five choices if you were not a Fortune 100 company running an IBM Mainframe: DEC, HP, IBM, Prime and...

View Article

Launch of OMG’s responsible computing consortium

May 10th 2022 marked a landmark achievement with the announcement of Object Management Group’s (OMG) creation of the responsible.computing() consortium with IBM and Dell as founding members. ‘While...

View Article


Protecting data against ransomware using IBM Cloud Object Storage

Protecting data against myriad cyberattacks can be a daunting task for administrators in today’s environment, and a growing concern is the increase in ransomware attacks against enterprises. These...

View Article


2021 Gartner® Magic Quadrant™ for IT Risk Management

IBM is once again recognized as a Leader in the 2021 Gartner Magic Quadrant for IT Risk Management. As uncertainties in the global business environment continue to evolve, risk complexity expands and...

View Article
Browsing latest articles
Browse All 33 View Live