Tackling the privacy goals and profiling the data and network threats and solutions in a connected world.

  • It's just three years since IBM set out a new security framework, designed to secure businesses operating over multiple platforms from on-premises to managed services and the cloud. Since then, the whole security focus at IBM has undergone radical restructuring and become its own division, with control over its own destiny. The result is a security approach that covers mobile devices to mainframes, on-premises deployment to cloud and a federated architecture that offers hope for the future. At IBM Interconnect 2015, the vendor’s newly formatted premier Cloud and mobile conference held in Las Vegas from 22nd to 27th February, CIC got a feel for the drive propelling the newly formed Security Business Unit forward.
  • Like many technologies, there has never been a golden age for computer security, where systems were perfectly secure and no-one did anything remotely bad. Mainframes and minicomputers were just as susceptible to people using acoustic couplers, low speed modems and hacking into local accounts in the 20th Century as modern systems are to hackers in the 21st Century. What has changed is the scale and the nature of the threat. That continually evolving threat means that the Chief Information Security Officer (CISO) and Chief Information Office (CIO) are struggling to understand how to combat the risk to the enterprise. IBM believes that, with decades of experience and a multi-billion dollar investment in this area, it can deliver the right architecture, knowledge, tools and skills to help solve this problem. In this report we take a look at IBM’s latest security story and how it is evolving to meet the threat which enterprises are facing.
  • The biggest non-news every year is the surveys that say c-level executives worry about protecting corporate data. It is time to evolve the way we do security and to introduce new approaches to dealing with new threats. In this article we look at the cost of getting security wrong and how we need to change.
  • Bola Rotibi, Research Director, Creative Intellect Consulting and founding member of the (ISC)2 Application Security Advisory Board, looks at the ‘ownership’ challenge in securing software. Reprint.
  • As we have begun to closely define the technologies that make up Cloud computing, the overuse of the phrase is causing confusion and no where moreso than in the crucial area of security in the Cloud. This reports examines what it really means in detail.
  • In October and November 2010, Creative Intellect Consulting UK undertook a survey to understand the impact of security on the software development and delivery processes. This report, carried out after an in- depth survey with members of information security professional body (ISC)2; the International Association of Software Architects (IASA); software development, IT and information security professionals; and software architects around the world, represents current practices firmly in the dock. It throws up in black and white just how serious the issue is.