Thursday, 27 June 2024
Top 7 risks to your identity security posture
Thursday, 9 May 2024
Simplifying IAM through orchestration
Securing the digital journey
Identity orchestration
Benefits of identity orchestration
Leverage IBM Security Verify
Friday, 12 April 2024
IBM researchers to publish FHE challenges on the FHERMA platform
FHE: A new frontier in technology
Progress in FHE
Fostering innovation through challenges
Driving progress and adoption
Tuesday, 12 December 2023
Leveraging CISA Known Exploited Vulnerabilities: Why attack surface vulnerability validation is your strongest defense
CISA Known Exploited Vulnerabilities to strengthen cybersecurity resilience
- Have been assigned a CVE ID
- Have been actively exploited in the wild
- Have a clear remediation action, such as a vendor-provided update
Shifting from traditional vulnerability management to risk prioritization
- These vulnerabilities from CISA KEV can be exploited in software in their environment.
- The compensating controls they have put in place are effective at detecting and blocking breaches. This allows teams to understand the real risk facing their organization while simultaneously assessing if the investments they have made in security defense solutions are worthwhile.
The importance of ASM in gathering continuous vulnerability intelligence
Verifying exploitable vulnerabilities with the IBM Security Randori
Monday, 12 June 2023
How Krista Software helped Zimperium speed development and reduce costs with IBM Watson
The challenge of staying one step ahead in mobile security
Krista Software helps Zimperium automate operations with IBM Watson
Powering change: IBM’s embeddable AI software portfolio
Saturday, 6 November 2021
Securing the open source software supply chain
Cybersecurity incidents are among the greatest threats facing organizations today. In the wake of recent high-profile software supply chain attacks, the US Federal government has taken bold action to strengthen the country’s cyber resilience. On 12 May 2021, President Biden issued a widely anticipated Executive Order on Improving the Nation’s Cybersecurity, which calls for stringent new security guidelines for software sold to the federal government, and has wide-ranging implications that will ripple across the entire software market.
Despite the troubling frequency of malicious attacks, most organizations still have only a partial view of the make-up of their software applications. This partial knowledge leaves them exposed to unknown software component vulnerabilities and hampers any response efforts.
Anaconda asked about open source security in our 2021 State of Data Science survey, and the results were surprising:
◉ 87% of respondents said they use open source software in their organization.
◉ 25% are not securing their open source pipeline.
◉ 20% did not report any knowledge about open source package security.
We also found that in organizations that aren’t using open source software today, the most common barrier to entry is security concerns, including fear of common vulnerabilities and exposures (CVE), potential exposures, or risks. It’s no secret that open source software is key to accelerating the development of new business ideas—not only by saving time, but by allowing greater collaboration and assembling more minds to solve for some of the world’s toughest challenges. With the increased visibility and involvement from third parties, however, these benefits come with exposure to potential risk. IT departments need solutions that support innovation but also provide governance to mitigate the damage from any attack or exposure.
Providing security and trust in open source
CVE matching and remediation information enables an organization to build a secure supply chain tailored to their unique needs and policies. For example, one foundational cybersecurity practice is to consult CVE databases and scores regularly to guard against the risk of using vulnerable packages and binaries in applications. Anaconda Repository for IBM Cloud Pak® for Data automates this process by allowing IT security administrators to filter access to packages and files against a curated database of known vulnerabilities. This effort-saving feature frees developers and data science teams to focus on building models.
Collaborating to confront risks head-on
The Executive Order includes many additional steps to improve cybersecurity, such as providing a software bill of materials (SBOM) that enables potential software consumers to know exactly how something is developed. These additional steps are essential for mitigating the many malicious cyber campaigns aimed at gathering critical information and disrupting operations across the nation. As society continues to become more and more technologically driven, vulnerabilities are inevitable. However, a spirit of transparency and collaboration—when combined with the right tools—will help enterprises guard against potential breaches and hacks to their systems, so they can continue to innovate and safely collaborate in the open source ecosystem.
Anaconda Repository for IBM Cloud Pak for Data helps organizations identify vulnerabilities and enables greater control over open source packages in use by allowing admins to block or safelist packages based on IT policies and CVE scores.
Source: ibm.com
Tuesday, 13 July 2021
Data resilience and storage — a primer for your business
Data resilience has become increasingly vital to modern businesses. Your ability to protect against and recover from malicious attacks and other outages greatly contributes to your business success. Resilient primary storage is a core component of data resilience, but what is it exactly?
Read on to get answers to important questions about data resilience and to see how resilient primary storage for your data can help your business thrive.
What is data resilience?
Data resilience is the ability to protect against and recover quickly from a data-destructive event, such as a cyberattack, data theft, disaster, failure or human error. It’s an important component of your organization’s overall cyber resilience strategy and business continuity plan.
Keeping your data — and your entire IT infrastructure — safe in the event of cyberattack is crucial. A 2020 report by Enterprise Strategy Group found that 60% of enterprise organizations experienced ransomware attacks in the past year and 13% of those organizations experienced daily attacks. Each data breach, according to the Ponemon Institute, can cost an average of USD 3.86 million. By 2025, cybercrime costs are estimated to reach USD 10.5 trillion annually, according to Cybersecurity Ventures.
In addition to combating malicious attacks, data resilience is vital to preventing data loss and helping you recover from natural disasters and unplanned failures. Extreme weather events such as floods, storms and wildfires are increasing in number and severity, and affect millions of people and businesses all over the world each year. In 2018, the global economic stress and damage from natural disasters totaled USD 165 billion, according to the World Economic Forum in their 2020 Global Risks Report.
While the first order of business is to prevent data-destructive events from occurring, it’s equally important to be able to recover when the inevitable happens and an event, malicious or otherwise, takes place.
Your preparedness and ability to quickly respond hinges on where you are storing your primary data. Is the solution resilient? Ensuring your data stays available to your applications is the primary function of storage. So, what are the characteristics of resilient primary storage that can help?
5 characteristics of a resilient storage solution
A resilient storage solution provides flexibility and helps you leverage your infrastructure vendors and locations to create operational resiliency – achieving data resilience in the data center and across virtualized, containerized and hybrid cloud environments.
How can I ensure my organization has data resilience?
Saturday, 26 June 2021
Extend privacy assurance in hybrid cloud with IBM Hyper Protect Data Controller
As IBM CEO Arvind Krishna has stated, data breaches and ransomware attacks such as the recent attack on Colonial Pipeline are increasing in frequency and scope, making data protection and privacy more critical than ever. According to a recent study conducted by Ponemon and commissioned by IBM, customers’ personally identifiable information (PII) was the most frequently compromised type of record, impacted in 80% of the data breaches studied. At the same time, many enterprises are adopting hybrid cloud architectures to help them increase agility and drive innovation. In today’s threat landscape, sharing data across a hybrid cloud environment introduces new challenges around maintaining compliance and governance—and new security vulnerabilities that bad actors can take advantage of.
Enterprises need to be able to share data to extract value from it, but how can they maintain privacy assurance in the era of hybrid cloud?
Maintain privacy by policy
Today we announce the latest addition to the IBM Hyper Protect Services family designed to help you gain a higher level of privacy assurance and maintain data integrity: IBM Hyper Protect Data Controller. This data-centric audit and protection capability allows you to define and control who has access to eligible data as it leaves the system of record and moves throughout your enterprise. With the addition of IBM Hyper Protect Data Controller, the security capabilities and technical assurance associated with Hyper Protect Services help provide protection for your consistent data access policies. Additionally, robust audit logging can help you address your regulatory compliance directives.
The data-centric protection provided by Hyper Protect Data Controller opens a wide range of new possibilities for data sharing, so you can leave non-sensitive data in the clear while keeping sensitive data private. Consider the data used by the call center agent at your bank. The bank stores data in their system of record, and the agent needs access to certain information to assist you—such as the last four digits of your social security number to verify your identity. IBM Hyper Protect Data Controller protects your eligible sensitive data using encryption and masking before it leaves the system of record, and only reveals the data that the agent is authorized to see. This is made possible through a set of centralized policy controls that the data owner can dynamically update when the agent’s access needs change—including revocation of future access if the agent no longer has the call center responsibilities and moves into a different role within the organization.
Prevent unauthorized policy changes
Once a data owner sets policy controls that govern data access, how can they be sure a bad actor won’t modify them? IBM Hyper Protect Data Controller is deployed within IBM Hyper Protect Virtual Servers, which establishes a protective boundary designed to prevent access by unauthorized users—providing the data owner with a tamper-resistant confidential computing environment to set and maintain policy controls for data access.
Whether you are running your workloads with sensitive data in the cloud, on premises or in a hybrid solution, Hyper Protect Services can offer you protection for your sensitive data, keys and now data access policies. We look forward to continuing our journey to protect your data access and use, wherever it resides.
Source: ibm.com
Thursday, 10 June 2021
IBM expands investment in data protection
IBM’s customers continue to validate that data protection and cyber resiliency are key challenges on their hybrid cloud journey toward digital transformation. Modernization of applications and the shift to container-native solutions are prerequisites for speed and agility, and this goes hand-in-hand with best-in-class data management practices for high availability, disaster recovery and data resiliency.
As another clear example of IBM’s commitment to our customers’ ongoing transformation success, as well as our venerable storage business unit, IBM has acquired technology assets and the associated engineering teams from Catalogic Software, a proven provider of data protection, copy data management and data resiliency solutions.
Read More: C2090-543: IBM DB2 9.7 Application Development
Catalogic Software has been an important development resource for IBM Storage® technologies over the past few years, and these acquired assets and engineering talent have helped innovate our award-winning IBM Spectrum® Protect Plus and IBM Spectrum® Copy Data Management solutions.
This move will enable IBM to swiftly integrate advanced data protection and cyber resiliency capabilities into our highly anticipated IBM Spectrum® Fusion family of container-native software defined storage solutions. Designed for AI, analytic and big data applications and workloads, Spectrum Fusion will seamlessly span edge, core data center and hybrid cloud environments (announced April 27th). In addition, we will leverage the technologies to continue to accelerate our data protection roadmap and advance these products, as well as enable new hybrid cloud and container-native cyber resiliency capabilities across the entire portfolio.
“Modern data protection and data resilience are top-of-mind with our customers, from the largest to the smallest,” said John Callisto, Vice President, US Sales at GlassHouse Systems. “To solve the multitude of challenges they face to keep their data protected and resilient, they rely on IBM’s Spectrum Protect family, which not only protects their data, but enables them to recover quickly in the event of a breach. With today’s agreement, IBM will be able to continue to accelerate their leading-edge data resilience and data protection solutions.”
This investment also further bolsters our leadership in hybrid cloud and container-centric data protection and cyber resilience. IBM Spectrum Protect Plus, which is already used by several cloud providers for their backup-as-a-service offerings, is also available from several of the largest hyperscalers, including IBM Cloud, through their cloud marketplaces.
Simply put, Catalogic Software’s technology combined with IBM’s storage portfolio will help customers discover, secure, protect and manage data from the edge, to the data center, to the public cloud.
*Statements by IBM regarding its plans, directions, and intent are subject to change or withdrawal without notice at the sole discretion of IBM. Information regarding potential future products is intended to outline general product direction and should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for IBM products remain at the sole discretion of IBM.
Source: ibm.com
Monday, 8 March 2021
Storage made simple for all
Information technology (IT) is growing more complex every year. In fact, two out of three IT decision-makers surveyed say that their IT environment is more complex now than it was two years ago. Adding to traditional challenges such as greatly increasing data volumes and the ever-evolving cybersecurity landscape, new drivers of IT complexity include ongoing digital transformation, a modern and always-on mobile workforce and expanding hybrid cloud architecture.
IT complexity is costly. Operational expenses rise, general data risks increase and maintenance occurs more often. Even vulnerability to cyber threats increases with added complexity. So the question becomes, how can we reduce IT complexity and bring down costs?
Last year IBM introduced the new IBM FlashSystem® family. This is a single platform for all non-mainframe environments designed to simplify your storage infrastructure while delivering extensive enterprise-class storage innovation, including seamless hybrid cloud and container integration. The ongoing challenges, costs and risks imposed by IT complexity underscore the importance of today’s IBM Storage announcements. New IBM offerings, technologies and programs buck the complexity trend. With these new offerings, your storage solutions can potentially become more compact, less costly than the IBM FlashSystem 5100, and yes — much simpler.
The new IBM FlashSystem 5200 offers a perfect example of storage made simple for all.
Thursday, 24 December 2020
Cyber resiliency 101: Required learning for all
Cyber threats like ransomware, which made its very first appearance in 1989 and has been on security teams’ and law enforcement’s radar for the past 7 or 8 years, are not fads. It’s not going away. In fact, the cash-rich ransomware industry is flourishing. As a result, organizations are moving from the era of possibility to the era of probability of a successful cyber breach. It’s not hyperbole to say that it’s no longer a question of if an organization will face a cyberattack but rather when.
Protecting against ransomware is a top priority for most organizations as they look to protect themselves against lost productivity, lost brand equity or trust, and lost revenue. Protection against ransomware should be a 2-pronged approach with a focus on security and resiliency:
◉ With cybersecurity, the objective is preventative in nature. “Lock the doors to keep any bad actors out in the first place.”
◉ With cyber resiliency, the objective is to prevail in the event of a cyber breach. “The odds are we will be breached. We need to plan and prepare in order to continue operations despite a breach.”
It’s important to note: Organizations should work towards being both cyber secure and cyber resilient.
Monday, 26 October 2020
3 strategies for a holistic approach to cybersecurity
Strategy 1: Encrypt data at scale with IBM Z
Strategy 2: Protect workloads against threats with confidential computing
Strategy 3: Build security into your IT stack with IBM Z and IBM Power Systems
Friday, 3 January 2020
Three ways to collaborate to improve cybersecurity
You’re likely aware that data breaches impact the whole organization. All enterprise systems are potential cyberattack targets, and the negative impact of a breach can reverberate throughout the business. Whether you’re in security, IT, or operations, data security is your concern.
Collaboration enhances data security
When it comes to enterprise data security, you may find it challenging at times to connect the dots. If you’re in security, you need information about the IT solutions required to secure the data perimeter. If you’re in IT or operations, you need insights from your security counterparts to inform technology development and deployment.
Collaboration can bridge this gap. IT and security groups can work together to ensure that security needs are baked into IT initiatives, and that security issues are optimally addressed by technology. By collaborating closely, your two groups can maximize transparency and make the best security and IT decisions.
Here are three ways security and IT can collaborate to enhance cybersecurity.
1. Consider security needs in technology development
If you’re a security practitioner, you’re plugged into the most urgent and relevant security concerns. You also understand how these concerns impact the enterprise. If you’re an IT practitioner, you’re aware of these issues and that they may impact applications you build. You can incorporate security peers’ insights into your IT projects to ensure your initiatives address all potential data-security risks and mandates.
For example, the recently enacted GDPR standards apply to virtually any personal data gathered by an enterprise that does business with or in the European Union. Before developing a new program that will use or request customer data, you must ensure that the program complies with GDPR mandates. Involve your security peers as early as possible here. Their early insights will help ensure that GDPR compliance is built into the application, not tacked on as an afterthought. A little collaboration at the start can save you a lot of headaches later.
2. Use IT to solve security challenges
The solution for an enterprise data-security challenge is often technology. This creates a natural synergy between security and IT practitioners. If you’re looking to address a data-security concern, one of your first conversations should be with your counterparts in IT. Often they will have the hammer for your nail, or they will be able to build the hammer.
Say you’re a security practitioner and your CISO has informed you that only a small portion of your enterprise data is encrypted. You probably both know, as the Breach Level Index has detailed, that unencrypted data is significantly more likely to be stolen by cybercriminals. Since expanding data encryption will likely require technology, you should then meet with your IT counterparts to discuss a solution. Perhaps they can find a way to devote more computing power to encryption so that a larger percentage of data – or at least the most sensitive data – can be encrypted. Ideally, they will be able to efficiently encrypt all database, application and cloud enterprise data through the mainframe.
When pondering your most vexing security challenges, make a discussion with your IT and operations counterparts a priority. They’ll often have just the tool you need to get the job done.
3. Reframe security conversations
It can be tempting to view security as the naysayer of the business, always warning about what could happen or what should not be done. Such a view may steer some IT practitioners away from engaging with the security team as they should.
Security conversations don’t have to be negative. You and your security counterparts are responsible for making them productive and positive. Discussions should focus less on how security concerns are holding business back, and more on understanding risks and alternatives. For instance, as mentioned earlier, in the age of GDPR security practitioners will likely raise a red flag about any application that collects and uses customer data. This doesn’t mean that the application can’t be developed or even has to be drastically changed. The developer simply needs to make sure that processes for collecting, using and storing this data comply with the mandate. IT and security practitioners should work together before development begins to outline a process that is compliant without compromising user experience.
A final thought: Stay informed
Enterprise security is everyone’s job. Accounting for security in technology development, and the other way around, will create an ongoing positive feedback loop in which security is woven into the enterprise needs and solutions.
If you’re a security practitioner, you’re already living and breathing security, but some time with your IT counterparts can help inform your security strategies. If you’re in IT, consider investing some time in cybersecurity education. You don’t have to become an expert. But you should be plugged in on the latest security issues, from the most recent high-profile data breach to any new data regulations. SecurityIntelligence.com provides news and insights that keep you in the loop on today’s critical data security issues.
Collaboration, supported by a base of security and IT knowledge, will help ensure an engaged team, improving cyber security for your enterprise.
Discover how to stay secure while remaining efficient and agile
Download the Solitaire Report