Security

What is the best line of defence against Ransomware?

By |2017-10-11T15:40:17+01:0011 October 2017|Analysis, Software Security|

Of the various recent high-profile IT security breaches, perhaps the one to have the biggest impact on the public consciousness was that which affected the U.K.'s National Health Service. While other incidents may have had a greater financial cost or lead to greater loss of data, it was the inability for a hospital to treat [...]

Comments Off on What is the best line of defence against Ransomware?

CIC Insights: IBM z14 plays the trust card, but does it hold a winning hand?

By |2017-07-18T07:48:38+01:0018 July 2017|Analysis, Mainframe, Security, Vendor Analysis|

It's that time again, the time that most observers in the industry say will never happen. IBM is releasing the next generation of its z Systems mainframe products called the z14. IBM has seen an acceleration of sales across its z Systems business unit helped, in part, by the LinuxONE models. With z14, IBM will [...]

Comments Off on CIC Insights: IBM z14 plays the trust card, but does it hold a winning hand?

CIC Security Insights: What’s good about IBM and Cisco’s security hook up

By |2017-06-19T09:27:52+01:0019 June 2017|Analysis, Security, Software Security, Vendor Analysis|

IBM and Cisco have announced that they are to collaborate and better integrate their solutions to improve cybersecurity. In their press release announcement, the collaboration move will include: “IBM Security's QRadar, Watson for Cybersecurity, App Exchange, X-Force Threat Intelligence, Resilient IRP and managed security services, and Cisco's Next-Generation Firewall (NGFW), Next-Generation Intrusion Protection System (NGIPS) [...]

Comments Off on CIC Security Insights: What’s good about IBM and Cisco’s security hook up

IBM QRadar targets bad user behaviour

By |2016-10-17T10:52:10+01:0027 July 2016|Analytics, IT operations and system management, Security|

In December 2015 IBM opened up its security analytics platform IBM Security QRadar. The goal was to encourage customers, developers and third-parties to build custom applications to take advantage of the platform. It also announced the IBM Security App Exchange where companies could create, share and get new applications based on IBM's security technologies. The [...]

Comments Off on IBM QRadar targets bad user behaviour

IBM’s Elementary Move in Cyber Security

By |2016-10-17T10:52:13+01:0011 May 2016|Analysis, Analytics, Security|

Watson finally gets to play Holmes IBM has announced plans to strengthen its security product line with Watson for Cyber Security. Augmented skills: a new path towards closing the gap Part of the challenge for many companies when it comes to cyber security has been the lack of staff. Even when they do find qualified [...]

Comments Off on IBM’s Elementary Move in Cyber Security

Mobile Commerce growth is not just for Christmas…

By |2016-10-17T10:52:14+01:0030 October 2015|Analysis, Mobile, Software Security|

Alex Baldock is the Chief Executive Officer of Shop Direct, a company that owns websites including very.co.uk and littlewoods.com. He puts the company’s recent record revenues down to the growth in mobile commerce. Baldock said that in the last four years’ sales via mobile have gone from zero to 60%. In fact, sales via mobile [...]

Comments Off on Mobile Commerce growth is not just for Christmas…

From CIC’s burgeoning Internet of Things vault: signposts for the value chain

By |2016-10-17T10:52:17+01:0025 June 2015|Cloud, Internet of Things, Mobile, Networking, Platforms and Operating Systems, Security|

The mother of all conferences! That is how Mobile World Congress (MWC) is often billed.  Although in reality there are certainly one or two other conferences that can certainly live up to that grandiose title - the Consumer Electronic Show held in Las Vegas every January being one such example. However, anyone who has travelled [...]

Comments Off on From CIC’s burgeoning Internet of Things vault: signposts for the value chain

Putting the social into Threat Intelligence

By |2016-10-17T10:52:18+01:0016 April 2015|Analysis, Security, Software Security|

The announcement of IBM X-Force Exchange as a new way to share threat intelligence data was made by Brendon Hannigan, GM, IBM Security Division at IBM InterConnect in February. As of today, the service is finally live and it looks interesting, not least because IBM is hoping that by using a community approach, social media [...]

Comments Off on Putting the social into Threat Intelligence

CIC Security Briefing Note: IBM delivers Dynamic Security for Hybrid Cloud

By |2016-10-17T10:52:21+01:0012 November 2014|Analysis, Cloud, Security, Software Security|

Over the last few years, IBM has invested heavily in rebuilding its security products. It has made a lot of point acquisitions to address perceived weaknesses in their product portfolio and aligned many of its internal tools to ensure a coherent product strategy. IBM makes a play for delivering a unified architecture, platform, security tools [...]

Comments Off on CIC Security Briefing Note: IBM delivers Dynamic Security for Hybrid Cloud

CIC Security Briefing Note: Without the right help, the CISO will not secure the enterprise

By |2016-10-17T10:52:21+01:0012 November 2014|Analysis, Security, Software Security|

Regular surveys of C-Suite executives around the world consistently show that information security is among their top three concerns. This is hardly surprising. The rising tide of compliance and privacy legislation bringing in potentially crippling fines, customers willing to launch class-action lawsuits and the impact on businesses of a trashed reputation mean that companies can [...]

Comments Off on CIC Security Briefing Note: Without the right help, the CISO will not secure the enterprise