To mitigate the risks of shadow IT, organizations must demonstrate the necessary agility and high quality of complex service assurance that users are looking for. More >
The number of user accounts affected by Yahoo's security breach -- previously reported as 200 million -- turns out to be more like 500 million. More >
Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. More >
This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. More >
The news puts a spotlight on the risks of free email services and, in turn, how it can put businesses at risk. More >
The IIoT is the domain of industry, government and other realms, so it’s not surprising that IIoT security is very important, complex and daunting. More >
The ease with which confidential information can be shared outside the company is a perennial headache for those charged with managing security.More >
We have built a regulatory framework that is ineffective at recognizing, let alone combatting, cybercrime.More >
CEO talks about the work SAP NS2 is doing, especially in regard to serving U.S. military veterans.More >
Regardless of the pace at which businesses adopt the IoT, ITSM will have to evolve to deal with IoT-driven changes such as more connected nodes, data points and automation, all of which add complexity.
A Korean-American whose family emigrated to the United States when she was five years old, Suh embodies what one hopes is the future of IBM.
Successful IT leaders have to have very specific skills, but still know how to run a team, meaning they must master the so-called soft skills that are not taught formally.
To mitigate the risks of shadow IT, organizations must demonstrate the necessary agility and high quality of complex service assurance that users are looking for.More >
This document provides recommendations and guidelines for enhancing trust in email, including transmission and content sec...
This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...
This document makes recommendations for how users and developers should select checklists from the NIST National Checklist...
This publication is intended to assist organizations in understanding the basics of application whitelisting. It also expl...