Instrumented Interconnecteds Intelligent

Kevin Skapinetz, Director of Strategy and Product Marketing, IBM Security

Kevin Skapinetz, Director of Strategy and Product Marketing, IBM Security

By Kevin Skapinetz

A few years back, companies began listening to employees who wanted to bring their own devices (BYOD) to work. They established security policies to allow the use of personal devices for accessing company information anytime, anywhere.

Not surprisingly, the workforce continues to look outside the corporate walls for new ways to get their jobs done and one go-to technology are the cloud apps they use in their daily lives.

As of today, however, most organizations have visibility into only a fraction of the third-party apps their employees are using for work purposes. Making matters worse, many lack the ability to manage and secure the data and files their employees are uploading and share to these apps.

But instead fighting the trend, we believe businesses should embrace “bring your own apps” as well as BYOD, to work. Continue Reading »

Bookmark and Share

Source: U.S. Department of Transportation

Artist’s rendering of the U.S. Department of Transportation’s Vehicle-to-Vehicle Communication System. (Source: USDOT)

By Chris Poulin

Cars are headed to the cloud. The hottest trend right now in the auto industry is the connected car. And the cloud, with its massive storage, processing, and analytical heft, will power this shift to wired cars. In fact, the auto industry is one of many industries that are working on making their business secure in the cloud.

The momentum behind the connected car is unstoppable. We’ve already seen how cars networked to auto makers’ safety and assistance services help to save lives. In addition to linking with smart devices, we are now seeing cars that can swap signals from sensors in traffic lights, buses, and signs along the road to warn of accidents and cut congestion. Continue Reading »

Bookmark and Share
December 11th, 2014

SP Christina Peters

Christina Peters, Chief Privacy Officer, IBM

By Christina Peters

American adults are feeling increasingly less confident about their ability to control and ensure the privacy and security of their personal information, according to a recent study from Pew Research.

While people routinely share such information when they believe doing so will benefit them, consumers and citizens everywhere are concerned about the risks and often skeptical about the promised benefits of sharing their personal data. Information analysis has become an indispensable tool for businesses, governments and organizations of all kinds – in every industry around the world. Improvements that data analytics can bring in areas like transit, energy conservation and medical have made analytics too compelling for the private and public sector to ignore.  Continue Reading »

Bookmark and Share

By Chris Sciacca

Dr. Gregory Neven, IBM Research

Dr. Gregory Neven, Cryptographer, IBM Research – Zurich

If you believe the press, you may think that passwords are antiquated. And who could blame you? With major breaches being reported at popular websites such as LinkedIn, Adobe, Yahoo!, and Twitter, passwords may sound like a vestige of past security solutions.

Well, not so fast. IBM scientists have developed a three-pronged approach that can secure all of your passwords for social media, email, cloud files or shopping websites, with one practically, hack-proof password.

And this password is secured by something they like to refer to as the “Memento Protocol.” In the 2000 film “Memento” by Christopher Nolan, the protagonist suffers from short-term memory loss. Throughout the film he meets several so-called friends, but due to his condition he never really knows if they are trustworthy or if they are trying to steal something from him. Continue Reading »

Bookmark and Share

Tal Rabin

Tal Rabin, Manager of Cryptographic Research, IBM Research

“In most cases of security breaches, it’s not the cryptography that’s the problem. It’s the implementation,” said IBM’s Manager of Cryptographic Research Tal Rabin.

She’s referring to the cryptography used to protect our online lives – passwords, two-factor authentication, etc. The implementation is the software built around that cryptography – websites, email, etc. Holes in the latter allow hackers to circumvent the former.

Tal, whose career of writing and developing sophisticated cryptographic protocols has led to a New York Times feature, World Science Festival presentation, an appearance on WNYC’s The Takeaway’s Science Fair, and most-recently the Anita Borg Institute’s “Women of Vision” award, started out studying computer science at the Hebrew University of Jerusalem with the goal, as she puts it, “to get a tech job.” Continue Reading »

Bookmark and Share

Larry Ponemon, Chairman, Ponemon Institute

Larry Ponemon, Chairman, Ponemon Institute

Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research “think tank” dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management or RIM framework. Today, Dr. Ponemon and IBM announced the 9th annual 2014 Cost of a Data Breach Study. Here’s a snapshot of our conversation.

What would you say is the number one finding from your research?

What is interesting is that globally the average cost of a data breach grew to $3.5 million (in U.S. dollars). That’s an increase of 15 percent compared to 2013. The average cost for each lost or stolen record containing sensitive and confidential information increased nine percent to $145.  In the U.S., the average U.S. breach involved the loss or theft of 30,000 records and the average cost to the companies affected by the breach increased from $5.4 million in 2013 to $5.9 million in this year’s study.

Continue Reading »

Bookmark and Share

Laurence Guihard-Joly, General Manager, IBM Business Continuity and Resilience Services

Laurence Guihard-Joly, General Manager, IBM Business Continuity and Resilience Services

By Laurence Guihard-Joly

Every company needs electricity, but that doesn’t require building a power plant. Many organizations have reached the same conclusion about computing and storage needs. Why build out data centers if it’s not your core business? Plus it can be a costly proposition.

That’s basically the premise of cloud computing – turn to trusted partners for your computing needs so you can focus on the business. But when deciding on a cloud strategy, organizations should be careful not to simply focus on saving money.

To be sure, moving to the cloud is economical and brings greater efficiencies, but it’s also an opportunity to reexamine everything from finance systems to enterprise resource planning and even the helpdesk. It can be a means of improving business efficiency over every operation that runs on software. Adding redundancy and automating backup are two functions most cloud providers offer, with more or less sophistication. A cloud strategy – public, hybrid, private – is also an excellent place to rethink security and continuity strategy and options across the board. Continue Reading »

Bookmark and Share

Maria Dubovitskaya, Predoctoral Security Researcher, and Member of IBM Academy of Technology,

Maria Dubovitskaya, Predoctoral Security Researcher, and Member of IBM Academy of Technology

By Chris Sciacca

Ballet or mathematics? Most ordinary eight year olds girls would probably choose ballet, but Maria Dubovitskaya was anything but an ordinary eight year old.

One day, after ballet lessons in the Moscow suburb of Domodedovo, Maria’s parents were running a little late. She heard other children, mostly boys her age, clacking away on IBM 286 PC keyboards in the classroom next door. Peeking through a crack in the door Maria was overcome with curiosity.

“I remember they were drawing different figures on the screens and magically changing their shapes and colors simply by typing on the keyboard. I just had to try this out for myself.”

When her parents finally arrived, she immediately asked them to sign her up for a computer class.

“I didn’t know what to expect, but thinking back now, my parents were very supportive. In fact, a few days later my dad bought me a programming book for kids called The Encyclopedia of Professor Fortran, and also brought home a very simple computer. I was hooked,” said Maria. Continue Reading »

Bookmark and Share

Robert Griffin, Vice President, Industry Solutions, IBM

Robert Griffin, Vice President, Counter Fraud Solutions, IBM

By Robert Griffin

“Fraud is a normal cost of doing business.”

Any organization that subscribes to this long-standing mantra needs to rethink their priorities. With 2.5 billion gigabytes of data created every day, fraud is taking on a new face in the Big Data world.

According to the Association of Certified Fraud Examiners (ACFE), organizations forfeit five percent of annual revenue to fraud, which by conservative estimates amounts to more than $3.5 trillion lost each year to global fraud and financial crimes. Fraudulent activity has grown in scope, volume and complexity, with the brash sophistication of recent attacks — and magnitude of damage, both to the brand and bottom line — elevating the anti-fraud conversation from acceptable loss to C-Suite imperative.

Today’s generation of organized and digitally-savvy criminals are using the same technologies that deliver efficiency to business and convenience to consumers — such as mobile devices, social networks and cloud platforms — to constantly probe for vulnerabilities and weaknesses. The pace of this threat continues to accelerate. Identity fraud impacted more than 12 million individuals in 2012, resulting in theft of nearly $21 billion, and each day the U.S. healthcare industry loses $650 million due to fraudulent claims and payments. Continue Reading »

Bookmark and Share

Andy Daudelin, Vice President, Security Services, AT&T Business Solutions

Andy Daudelin, Vice President, Security Services, AT&T Business Solutions

By Andy Daudelin

Among the 10 most stressful C-Suite roles of 2014 in business today is the role of chief information security officer (CISO). These IT security leaders set the strategy for the way a company protects itself from constantly evolving cyber threats – and they must implement these strategies without disrupting the speed of the business or its ability to innovate.

The threat landscape today is fraught with risk. IBM’s most recent Cyber Security Intelligence Index confirms that the average company faces 1.57 million security events per week, with 1,400 of those identified as actual attacks. And earlier this year, I discussed how new security threats and regulations will make 2014 a critical year for compliance and audit demands, and organizations need to be better prepared.    

Cloud and mobile technologies are an excellent example of the balance CISOs must strike as they strive to protect the IT infrastructure while incorporating emerging technologies. Many companies are finding cloud an ideal platform for emerging business applications and are integrating those cloud-based services with their traditional technology platforms. It’s the CISO’s mission to secure all of this – and its underlying data – as a single seamless service. Continue Reading »

Bookmark and Share

Subscribe to this category Subscribe to security