IBM
Ring Mandates Two-Factor Authentication, License Plate Reader Data Sharing, RSA Conference Coronavirus Fears
In episode 109 for February 24th 2020: Kevin Johnson joins us to discuss how Ring made two-factor authentication mandatory following recent hacking incidents, California police have been caught illegally sharing license plate ...
IBM Looks to Unify Cybersecurity
IBM today announced it is leveraging containers and microservices to make a suite of security software available on any platform running on-premises or in the cloud. Justin Youngblood, vice president of product ...
IBM Adds Encryption Everywhere Capabilities to the Mainframe
IBM today unveiled a z15 mainframe that takes advantage of additional processing horsepower to create Trusted Data Objects that allow organizations to employ Privacy Passports technology to encrypt data across a hybrid ...
IBM Advances Cryptography Ahead of Quantum Computers
IBM is gearing up to deliver quantum-safe cryptography services on the IBM public cloud next year and is now making available a prototype of what it claims to be the first quantum ...
IBM Study Shows Data Breach Costs on the Rise
For the 14th consecutive year, IBM Security released its annual Data Breach Report that examines the financial impact of data breaches on organizations. According to the report, the cost of a data ...
Details of the Cloud Hopper Attacks
Reuters has a long article on the Chinese government APT attack called Cloud Hopper. It was much bigger than originally reported. The hacking campaign, known as "Cloud Hopper," was the subject of ...
8/27/19 – Dtex, Insider Threat, Privacy News: Microsoft APT28 Shut Downs Highlight Insider Threat Risks, Tech Heavyweights Seek to Sidestep California Privacy Law
Last week, Microsoft reported that it detected six internet domains that were set up by cyberattack groups associated with the Russian government. According to Microsoft: Last Week, Microsoft’s Digital Crimes Unit (DCU) ...
DeepLocker: new breed of malware that uses AI to fly under the radar
IBM researchers are seeking to raise awareness that AI-powered threats are coming our way soon. To that end, they’ve created an all-new breed of malware to provide insights into how to reduce ...
Cyber Security Roundup for May 2018
I'm sure the release of the GDPR on 25th May hasn't escaped anyone's attention. After years of warnings about the EU parliament's intended tough stance on enforcing the human right to privacy ...
Application Development GDPR Compliance Guidance
Last week IBM developerWorks released a three-part guidance series I have written to help Application Developers develop GDPR compliant applications. Developing GDPR Compliant Applications GuidancePart 1: A Developer's Guide to the GDPRPart ...

