Addressing the cybersecurity skills gap with higher education
As cyberattacks and security incidents continue to rise, the demand for skilled cybersecurity professionals in government and private sectors has reached unprecedented levels. The United States faces...
View ArticleIBM Cloud security: How to clean up unused access policies
When was the last time you looked over existing access policies in your cloud account? It’s very likely that it is not on your regular tasks (yet), but it should be done regularly to improve security....
View ArticleThree essential steps to protecting your data across the hybrid cloud
In a recent trend, many organizations are opting to store their sensitive data in the cloud. Others choose to keep their sensitive data on-premises or even across multiple types of environments. As a...
View ArticleHow Krista Software helped Zimperium speed development and reduce costs with...
Successful businesses are embracing the power of AI to help streamline operations, generate insights, boost productivity and drive more value for clients. However, for many enterprises, the barrier to...
View ArticleRegulated workloads with Citrix-DaaS: Configuration for stricter security and...
In a world of increasing security threats, IBM Cloud offers a variety of solutions to assist you in security and compliance. We have incorporated several IBM Cloud services into our Citrix-DaaS...
View ArticleFor a short time only: Time-based restrictions for enhanced cloud security
If you read some of my earlier blog posts, you know that I automated the setup (onboarding) for workshops and hackathons. Thus far, running my Terraform scripts to deploy resources and privileges...
View ArticleThe next step in homomorphic encryption for Linux on IBM Z and LinuxONE
101 billion. That’s the number of data records compromised in 20201. This made 2020 a record-breaking year for data breaches – the cost per breach also hitting a record high with an average of $4.24...
View ArticlePower makes it possible: experience the four pillars of success
How the IBM® Power® E1080 provides increased security, scalability, and resilience From time to time, we invite industry thought leaders to share their opinions and insights on current technology...
View ArticleAutomating workplace vaccination verification — a path out of the pandemic
Workplace vaccination mandates are coming for employers. In the United States, The Department of Labor’s Occupational Safety and Health Administration (OSHA) recently released a rule on requiring all...
View ArticleCustomer choice always drives innovation
Almost 35 years ago, if you needed a computing device to run business applications you had only five choices if you were not a Fortune 100 company running an IBM Mainframe: DEC, HP, IBM, Prime and...
View ArticleLaunch of OMG’s responsible computing consortium
May 10th 2022 marked a landmark achievement with the announcement of Object Management Group’s (OMG) creation of the responsible.computing() consortium with IBM and Dell as founding members. ‘While...
View ArticleProtecting data against ransomware using IBM Cloud Object Storage
Protecting data against myriad cyberattacks can be a daunting task for administrators in today’s environment, and a growing concern is the increase in ransomware attacks against enterprises. These...
View Article2021 Gartner® Magic Quadrant™ for IT Risk Management
IBM is once again recognized as a Leader in the 2021 Gartner Magic Quadrant for IT Risk Management. As uncertainties in the global business environment continue to evolve, risk complexity expands and...
View Article