What is the best line of defence against Ransomware?

By |2017-10-11T15:40:17+00:0011 October 2017|Analysis, Software Security|

Of the various recent high-profile IT security breaches, perhaps the one to have the biggest impact on the public consciousness was that which affected the U.K.'s National Health Service. While other incidents may have had a greater financial cost or lead to greater loss of data, it was the inability for a hospital to treat [...]

CIC Insights: IBM z14 plays the trust card, but does it hold a winning hand?

By |2017-07-18T07:48:38+00:0018 July 2017|Analysis, Mainframe, Security, Vendor Analysis|

It's that time again, the time that most observers in the industry say will never happen. IBM is releasing the next generation of its z Systems mainframe products called the z14. IBM has seen an acceleration of sales across its z Systems business unit helped, in part, by the LinuxONE models. With z14, IBM will [...]

CIC Security Insights: What’s good about IBM and Cisco’s security hook up

By |2017-06-19T09:27:52+00:0019 June 2017|Analysis, Security, Software Security, Vendor Analysis|

IBM and Cisco have announced that they are to collaborate and better integrate their solutions to improve cybersecurity. In their press release announcement, the collaboration move will include: “IBM Security's QRadar, Watson for Cybersecurity, App Exchange, X-Force Threat Intelligence, Resilient IRP and managed security services, and Cisco's Next-Generation Firewall (NGFW), Next-Generation Intrusion Protection System (NGIPS) [...]

IBM QRadar targets bad user behaviour

By |2016-10-17T10:52:10+00:0027 July 2016|Analytics, IT operations and system management, Security|

In December 2015 IBM opened up its security analytics platform IBM Security QRadar. The goal was to encourage customers, developers and third-parties to build custom applications to take advantage of the platform. It also announced the IBM Security App Exchange where companies could create, share and get new applications based on IBM's security technologies. The [...]

From CIC’s burgeoning Internet of Things vault: signposts for the value chain

By |2016-10-17T10:52:17+00:0025 June 2015|Cloud, Internet of Things, Mobile, Networking, Platforms and Operating Systems, Security|

The mother of all conferences! That is how Mobile World Congress (MWC) is often billed.  Although in reality there are certainly one or two other conferences that can certainly live up to that grandiose title - the Consumer Electronic Show held in Las Vegas every January being one such example. However, anyone who has travelled [...]

CIC Security Briefing Note: IBM delivers Dynamic Security for Hybrid Cloud

By |2016-10-17T10:52:21+00:0012 November 2014|Analysis, Cloud, Security, Software Security|

Over the last few years, IBM has invested heavily in rebuilding its security products. It has made a lot of point acquisitions to address perceived weaknesses in their product portfolio and aligned many of its internal tools to ensure a coherent product strategy. IBM makes a play for delivering a unified architecture, platform, security tools [...]

CIC Security Briefing Note: Without the right help, the CISO will not secure the enterprise

By |2016-10-17T10:52:21+00:0012 November 2014|Analysis, Security, Software Security|

Regular surveys of C-Suite executives around the world consistently show that information security is among their top three concerns. This is hardly surprising. The rising tide of compliance and privacy legislation bringing in potentially crippling fines, customers willing to launch class-action lawsuits and the impact on businesses of a trashed reputation mean that companies can [...]