Companies and governments around the world must test their cloud security capabilities to keep sensitive data safe from hacktivists and cyber enemies.
Given the sensitivity of data and the rising volume of cyberattacks across the globe, government agencies have deep concerns about cloud security.
Cloud security must be a team effort between providers and customers. The distribution of responsibility depends on the cloud model.
Cloud security is neither a magic bullet for analysts, nor a particularly vulnerable target for cybercriminals. It all depends on the effort you put in.
A third-party contractor inadvertently exposed Verizon customer data, including names, phone numbers and PINs belonging to 14 million subscribers.
New enhancements to IBM's application security testing solutions enable clients to simplify SAST, remediate open source vulnerabilities and more.
Data loss prevention (DLP) policies aren't doing enough to combat collaboration tool violations. What does this mean for cloud security?
A secure digital transformation requires IDaaS solutions that enable IT to support business mandates without compromising the user experience.
Zombie cloud data — information that lingers in the cloud even after a user supposedly deletes it — can open organizations to data theft and noncompliance.
IBM will host an e-summit on cybersecurity in Asia-Pacific to foster collaboration and help IT teams embrace emerging technologies.