IBM Security Services Cyber Security Intelligence Index report

In a world where a week rarely goes by without reports of at least one serious cyber attack against a major organization, it's important to ask; What's happening across the threat landscape? What kinds of attacks are being launched? How many of those attacks result in incidents requiring investigation?

Spotlight

Glimmerglass Cyber Solutions

Glimmerglass is a close knit team of talented and dedicated employees who work together to develop complex, innovative solutions to counter cyber attacks for corporations and nations. Distinguished by a history of inventing and developing the world's most advanced products from the Intelligent Optical System to Path Manager, and ultimately the CyberSweep™, we take on hard engineering to solve the world's most intractable problems. We are a tightly connected community working together, cooperating to accomplish the impossible. Glimmerglass professionals are accomplished, talented, and driven to deliver the best performance of their careers.

OTHER WHITEPAPERS
news image

Unidirectional Security Gateways: Enabling Secure IT-OT Communications

whitePaper | June 28, 2022

Braking performance, corner analysis, pit stop strategy breakdowns. To watch a Formula 1 race today is as much about being an adrenaline junkie as it is being a data geek, thanks to the 300 sensors on an F1 car sending more than 1.1 million data points to the pits every second1.

Read More
news image

22 Cybersecurity Tips for 2022

whitePaper | June 13, 2022

Many cyber-attacks involve ransomware, a form of malicious software or malware, designed to deny access to a computer system or data until a ransom is paid and a decryption key (commonly called a decryptor) is given to the victim. The encryption is virtually unbreakable without the decryption key, and you should not spend valuable time seeking a way around the encryption if you are attacked with it. Ransomware can spread in multiple ways, but most typically, through phishing emails or by unknowingly visiting an infected website. Ransomware can be catastrophic to healthcare and other organizations, preventing critical information and systems for patient care from being accessed, for example.

Read More
news image

Scenarios for the Future of Cybercrime - White Paper for Decision Makers

whitePaper | January 28, 2020

Project 2020 is an initiative of the International Cyber Security Protection Alliance (ICSPA). Its aim is to anticipate the future of cybercrime, enabling governments, businesses and citizens to prepare themselves for the challenges and opportunities of the coming decade. It comprises a range of activities, including common threat reporting, scenario exercises, policy guidance and capacity building.

Read More
news image

Cloud-native security practicesin IBM Cloud

whitePaper | December 15, 2019

IBM Cloud™ is IBM’s high-performing public cloud platform, with data centers around the world that deliver cloud computing options from infrastructure as a service (IaaS), platform as a service (PaaS) to software as a service (SaaS). Security is a fundamental design principle for our cloud platform with market-leading security capabilities enabled for regulatory workloads.

Read More
news image

Cyber Risk Appetite: Defining and Understanding Risk in the Modern Enterprise

whitePaper | January 16, 2020

Managing risk is a balancing act for organizations of all sizes and disciplines. While some organizations take on too much risk, others arguably do not take on enough. Complicating this equation is the emergence of cyber as one of the most impactful sources of risk in the modern enterprise. In fact, cyber security is now increasingly reviewed by corporate boards of directors and often discussed with financial analysts who see cyber security risk as an imminent and paramount business risk. Because the consequences of cyber security failures can be damaging to business revenues and brand reputation, CEOs have lost their positions as a result of data breaches and inept preparation and planning.

Read More
news image

Warring State - China's cybersecurity strategy

whitePaper | December 1, 2019

Cyberspace and information technology have enabled the economic, political, and cultural inte - gration of the United States and China. However, interdependence creates costs as well as benefits. Increased interconnection has also contributed to major obstacles in the bilateral relationship, generating mutual distrust of incentives, actions, and norms in cyberspace. Information technology raises new challenges for states by allowing actors to exploit networks, conduct cyber espionage, or compromise national security with greater ease.

Read More

Spotlight

Glimmerglass Cyber Solutions

Glimmerglass is a close knit team of talented and dedicated employees who work together to develop complex, innovative solutions to counter cyber attacks for corporations and nations. Distinguished by a history of inventing and developing the world's most advanced products from the Intelligent Optical System to Path Manager, and ultimately the CyberSweep™, we take on hard engineering to solve the world's most intractable problems. We are a tightly connected community working together, cooperating to accomplish the impossible. Glimmerglass professionals are accomplished, talented, and driven to deliver the best performance of their careers.

Events