Skip to main content

Sort by
Articles

IBM and Cohesity Collaborate to Offer New Security Solution

TechChannel

March 3, 2023

On March 2, IBM announced that it is partnering with Cohesity to offer a new Storage Defender solution that includes IBM Storage Protect, IBM Storage FlashSystems, IBM Storage Fusion, and Cohesity DataProtect. IBM Storage Defender uses AI and event monitoring to combat the impacts of breaches and cyberattacks as security risks rise in today’s data-driven […]

Podcasts

A Deep Dive Into Deep Fakes With Dr. Ilke Demir

Charlie Guarino

March 2, 2023

Charlie Guarino: Hi everybody. This is Charlie Guarino. Welcome to another edition of TechTalk SMB. I’m really thrilled to have join me somebody that I have been reading so much about and have watched so many videos on, and it’s a real delight to have her here. I’m talking about Dr. Ilke Demir, and let me […]

Articles

Mainframe, Security and More: A Review of 2022 and a Look at 2023

Trevor Eddolls

January 19, 2023

2022 was the year people decided whether they wanted to go back to working in an office environment, or whether they preferred to work from home. At some organizations, management feared they would lose control of employees they couldn’t see all day. Other companies trusted their staff to complete tasks at times that suited them—given […]

Articles

IBM, Lenovo and HPE Servers Deliver Strongest Security as Data Breaches Surge

Laura DiDio

January 9, 2023

A 52% majority of enterprises cannot determine the amount of time it took their businesses to identify, isolate and shut down a security attack

Articles

Delivering Cyberresiliency for Mainframes

Mark Wilson

December 19, 2022

Cyberresilience is essential for operational and business continuity: it’s part-and-parcel of providing continuous protection for the business and maintaining a hardened security stance. How can you develop and deliver the right strategy to ensure this resilience, secure your mainframe systems and data from attack and other threats and, crucially, resume operations quickly and effectively in […]

Articles

IBM i Security in the Hybrid Workplace

Moshe Sofer

December 6, 2022

According to a recent AT&T work survey, “Hybrid work will be the foremost working model by 2024, with 56% of work done offsite.” Many companies that deployed remote work solutions during the pandemic found that employees working remotely can be as productive as being in the office. In addition, employees are demanding the flexibility to […]

Articles

Mainframe Security: Are There More Gaps in Your Defenses Than You Thought?

Trevor Eddolls

May 16, 2022

Hackers are always trying to find ways into your mainframe and exfiltrate your data. Trying to stay ahead of their ingenuity can be hard work. Luckily, penetration testers are doing that work for us, and we can learn a lot from them about how to strengthen our defenses. Threats to the Mainframe When people talk […]

Articles

IBM, Lenovo, HPE and Huawei Servers Rank as Most Secure Platforms in ITIC Survey

Laura DiDio

April 20, 2022

IBM, Lenovo, Huawei and Hewlett-Packard enterprise servers ranked as the most secure platforms in an ITIC survey—experiencing the fewest number of successful data breaches

Articles

Highlights From the 2022 X-Force Threat Intelligence Index

Trevor Eddolls

April 8, 2022

The annual X-Force Threat Intelligence Index from IBM Security is always a sobering read, and the 2022 edition is no exception. Here, we highlight some of the key security findings, statistics and trends in the report. Cyberattacks by the Numbers This year’s report outlines that phishing was the most common cause of cyberattacks in 2021. […]

Articles

Extending Cyberresilience Capabilities

Neil Tardy

February 22, 2022

Managing and maintaining storage networks was never easy, but over the past two years, the responsibilities and challenges that come with the job have multiplied and diversified. Administrators must provide secure access to networks that extend beyond virtual corporate boundaries to serve an ever-growing work from home user base. Ransomware and other threats to data […]