In December 2015 IBM opened up its security analytics platform IBM Security QRadar. The goal was to encourage customers, developers and third-parties to build custom applications to take advantage of the platform. It also announced the IBM Security App Exchange where companies could create, share and get new applications based on IBM's security technologies. The [...]
Over the last few years, IBM has invested heavily in rebuilding its security products. It has made a lot of point acquisitions to address perceived weaknesses in their product portfolio and aligned many of its internal tools to ensure a coherent product strategy. IBM makes a play for delivering a unified architecture, platform, security tools [...]
The Lawmakers move securing software up the agenda: HTC a high profile casualty With Mobile World Congress 2013 taking place in Barcelona this week and all the fanfare over new product launches and technology, it may have escaped many people's notice that something monumental has happened. No, it's not a new device, a new form [...]
IBM Software Analysts Insight: Will a clear vision and strategy lead to a sure-footed, agile execution?
The abiding impression from the IBM Software Analysts Insight conference in Stamford, Connecticut was of a company absolutely clear on its strategy and sure-footed in its execution. For nearly a decade (since 2004), IBM has been attempting to reduce the market’s identification with its individual software brands (Tivoli, Rational, Websphere, Information Management), and in 2010 [...]
Everywhere you look, the phrase of the last few years has been Cloud computing. When the term first started to be used it was meant to describe a change to the way we would do computing. In many ways it is an amalgamation and next generation of several technologies - outsourcing, utility based computing, grid [...]
Security, is a big nightmare. You have no idea what else may be running on the computer that your software is to be installed on. To be sure that your software is protected and to protect your users, developers must improve their secure code skills.