Skip to main content

Sort by
Articles

Highlights From the 2022 X-Force Threat Intelligence Index

Trevor Eddolls

April 8, 2022

The annual X-Force Threat Intelligence Index from IBM Security is always a sobering read, and the 2022 edition is no exception. Here, we highlight some of the key security findings, statistics and trends in the report. Cyberattacks by the Numbers This year’s report outlines that phishing was the most common cause of cyberattacks in 2021. […]

Articles

Extending Cyberresilience Capabilities

Neil Tardy

February 22, 2022

Managing and maintaining storage networks was never easy, but over the past two years, the responsibilities and challenges that come with the job have multiplied and diversified. Administrators must provide secure access to networks that extend beyond virtual corporate boundaries to serve an ever-growing work from home user base. Ransomware and other threats to data […]

Articles

Evil Mainframe Brings Ethical Hacking to the Forefront

Tiffany Lukk

August 26, 2021

When it comes to hacking, there are courses that can teach you to break past the security of almost anything. However, learning how to hack a mainframe usually isn’t one of them. That’s why Chad Rikansrud and Phil Young created Evil Mainframe, the first mainframe penetration testing class. “The IT world at large has benefited […]

Articles

Security Analytics Market to Gain Traction Across Healthcare Sector

Vinisha Joshi

June 7, 2021

The global market for security analytics solutions and services is set to churn out massive profits in 2021 and beyond. Here’s how: The 21st century is no doubt one of the profitable eras for large-scale digitization. With massive shifts toward digital platforms being a protocol of the current COVID-19 age, digitization has, perhaps, touched the apex. […]

E-Books

TechChannel E-book: How to Combat Remote Work Security Risks

TechChannel

May 10, 2021

How remote work has influenced data security trends, and what you can do to keep your data locked down

Articles

The Cybersecurity Market Is Rapidly Growing

Lauren Borchart

March 12, 2021

With the rise of internet usage and availability has also come an increase in cybercrimes like scamming, phishing and hacking. This has created a high demand for cybersecurity protocols and policies to help keep enterprises safe from cyber-attacks. According to a 2020 report from Global Market Insights (GMI), the cybersecurity market has been flourishing in […]

Articles

Using nmonchart; Verifying IBM Downloads

Rob McNelly

January 21, 2020

Courtesy of Russell Adams, here's some useful information on performance monitoring tool nmon and how to more securely verify IBM downloads.

Articles

Will You Be The Next Victim Of Ransomware?

Ben Wuest

September 11, 2017

Ransomware is malicious software that has been covertly installed on a device, such as your laptop or phone, which encrypts your private data and demands a monetary ransom for restoring the data to its original format. If the data is highly sensitive, the ransom may be the threat of public disclosure of the private data. […]

Articles

IBM Lab Services Helps Clients Stay Vigilant Against Data Hackers

Gene Rebeck

June 1, 2017

In July 2015, an operator noticed some heavy UNIX* System Service (USS) activity that seemed highly suspicious. Some scripts were sending spam messages all over the world from the client’s mainframe. The client called IBM Systems Lab Services for z Systems* and LinuxONE*, and the Lab Services team sprang into action. The team of highly […]

Key Enterprises LLC is committed to ensuring digital accessibility for techchannel.com for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards.