Instrumented Interconnecteds Intelligent
Smarter Security

Kevin Skapinetz, Director of Strategy and Product Marketing, IBM Security

Kevin Skapinetz, Director of Strategy and Product Marketing, IBM Security

By Kevin Skapinetz

A few years back, companies began listening to employees who wanted to bring their own devices (BYOD) to work. They established security policies to allow the use of personal devices for accessing company information anytime, anywhere.

Not surprisingly, the workforce continues to look outside the corporate walls for new ways to get their jobs done and one go-to technology are the cloud apps they use in their daily lives.

As of today, however, most organizations have visibility into only a fraction of the third-party apps their employees are using for work purposes. Making matters worse, many lack the ability to manage and secure the data and files their employees are uploading and share to these apps.

But instead fighting the trend, we believe businesses should embrace “bring your own apps” as well as BYOD, to work. Continue Reading »

Bookmark and Share

Source: U.S. Department of Transportation

Artist’s rendering of the U.S. Department of Transportation’s Vehicle-to-Vehicle Communication System. (Source: USDOT)

By Chris Poulin

Cars are headed to the cloud. The hottest trend right now in the auto industry is the connected car. And the cloud, with its massive storage, processing, and analytical heft, will power this shift to wired cars. In fact, the auto industry is one of many industries that are working on making their business secure in the cloud.

The momentum behind the connected car is unstoppable. We’ve already seen how cars networked to auto makers’ safety and assistance services help to save lives. In addition to linking with smart devices, we are now seeing cars that can swap signals from sensors in traffic lights, buses, and signs along the road to warn of accidents and cut congestion. Continue Reading »

Bookmark and Share
December 11th, 2014

SP Christina Peters

Christina Peters, Chief Privacy Officer, IBM

By Christina Peters

American adults are feeling increasingly less confident about their ability to control and ensure the privacy and security of their personal information, according to a recent study from Pew Research.

While people routinely share such information when they believe doing so will benefit them, consumers and citizens everywhere are concerned about the risks and often skeptical about the promised benefits of sharing their personal data. Information analysis has become an indispensable tool for businesses, governments and organizations of all kinds – in every industry around the world. Improvements that data analytics can bring in areas like transit, energy conservation and medical have made analytics too compelling for the private and public sector to ignore.  Continue Reading »

Bookmark and Share

By Chris Sciacca

Dr. Gregory Neven, IBM Research

Dr. Gregory Neven, Cryptographer, IBM Research – Zurich

If you believe the press, you may think that passwords are antiquated. And who could blame you? With major breaches being reported at popular websites such as LinkedIn, Adobe, Yahoo!, and Twitter, passwords may sound like a vestige of past security solutions.

Well, not so fast. IBM scientists have developed a three-pronged approach that can secure all of your passwords for social media, email, cloud files or shopping websites, with one practically, hack-proof password.

And this password is secured by something they like to refer to as the “Memento Protocol.” In the 2000 film “Memento” by Christopher Nolan, the protagonist suffers from short-term memory loss. Throughout the film he meets several so-called friends, but due to his condition he never really knows if they are trustworthy or if they are trying to steal something from him. Continue Reading »

Bookmark and Share

Laurence Guihard-Joly, General Manager, IBM Business Continuity and Resilience Services

Laurence Guihard-Joly, General Manager, IBM Business Continuity and Resilience Services

By Laurence Guihard-Joly

Every company needs electricity, but that doesn’t require building a power plant. Many organizations have reached the same conclusion about computing and storage needs. Why build out data centers if it’s not your core business? Plus it can be a costly proposition.

That’s basically the premise of cloud computing – turn to trusted partners for your computing needs so you can focus on the business. But when deciding on a cloud strategy, organizations should be careful not to simply focus on saving money.

To be sure, moving to the cloud is economical and brings greater efficiencies, but it’s also an opportunity to reexamine everything from finance systems to enterprise resource planning and even the helpdesk. It can be a means of improving business efficiency over every operation that runs on software. Adding redundancy and automating backup are two functions most cloud providers offer, with more or less sophistication. A cloud strategy – public, hybrid, private – is also an excellent place to rethink security and continuity strategy and options across the board. Continue Reading »

Bookmark and Share

Theresa Payton, Founder, Fortalice, LLC; Author

Theresa Payton, Founder, Fortalice, LLC; Author

From 2006-2008, Theresa Payton served as the White House CIO for the Bush administration. In 2008 she founded Fortalice, a security consulting firm focused on fraud issues related to consumer protection. She spoke today at IBM’s Counter Fraud Summit in New York. A Smarter Planet caught up with her to get her perspectives.  Here’s a snapshot of that conversation.

Smarter Planet: What types of fraud do you believe businesses should brace themselves for in 2014 and beyond?
Theresa Payton: There are multiple types of fraud consistently reported by businesses around the globe. They include the back office type, such as asset misappropriation, accounting fraud and procurement fraud. There are also fraud and financial crimes related to money laundering, and false claims. And then there’s also cybercrime. With all the digital smokescreens now available, I believe you will see these types of fraud continue. But you will also see cybercrime as a percentage of overall fraud numbers climb as the entry point to fraudulent activity. Continue Reading »

Bookmark and Share

Robert Griffin, Vice President, Industry Solutions, IBM

Robert Griffin, Vice President, Counter Fraud Solutions, IBM

By Robert Griffin

“Fraud is a normal cost of doing business.”

Any organization that subscribes to this long-standing mantra needs to rethink their priorities. With 2.5 billion gigabytes of data created every day, fraud is taking on a new face in the Big Data world.

According to the Association of Certified Fraud Examiners (ACFE), organizations forfeit five percent of annual revenue to fraud, which by conservative estimates amounts to more than $3.5 trillion lost each year to global fraud and financial crimes. Fraudulent activity has grown in scope, volume and complexity, with the brash sophistication of recent attacks — and magnitude of damage, both to the brand and bottom line — elevating the anti-fraud conversation from acceptable loss to C-Suite imperative.

Today’s generation of organized and digitally-savvy criminals are using the same technologies that deliver efficiency to business and convenience to consumers — such as mobile devices, social networks and cloud platforms — to constantly probe for vulnerabilities and weaknesses. The pace of this threat continues to accelerate. Identity fraud impacted more than 12 million individuals in 2012, resulting in theft of nearly $21 billion, and each day the U.S. healthcare industry loses $650 million due to fraudulent claims and payments. Continue Reading »

Bookmark and Share

Nataraj Nagaratnam, Distinguished Engineer, CTO, IBM Security Solutions

Nataraj Nagaratnam, Distinguished Engineer, CTO, IBM Security Solutions

By Nataraj Nagaratnam

With IDC predicting that by 2017, the U.S. Federal Government will quadruple from $2 billion next year to nearly $9 billion in what it spends on cloud computing (mostly on private cloud), the topic of cloud security is going to quickly become the center of attention in Washington D.C.

Though the government has established some early security certifications like the Federal Information Security Management Act of 2002 (FISMA) and the Federal Risk and Authorization management Program (FedRAMP) to give agencies guidance on security, there will be a heightened need to go even further as agencies move mission critical workloads to the cloud. Continue Reading »

Bookmark and Share
November 12th, 2013

Chris Preimesberger, Features & Analysis Editor, eWEEK

Chris Preimesberger, Features & Analysis Editor, eWEEK

By Chris Preimesberger

The sheer numbers of digital devices, users and connections – combined with commensurate lack of understanding of digital security – has never presented a better opportunity or more fertile ground for the bad guys in computer hacking.

By 2017, there will be about 3.6 billion Internet users, almost half of what will be the projected worldwide population of 7.6 billion people that year. By comparison, there were 2.3 billion users in 2012, or about 32 percent of the world’s population, according to a recent industry report.

Also expected within the next few years is the management of more than 19 billion network connections – for both fixed and mobile devices – as well as M2M connections, up from about 12 billion in 2012. That’s an enormous amount of network activity which is certain to strain both IT and security providers. Continue Reading »

Bookmark and Share

SP FACT 2013By Keith Byrne, Intelligence Manager, U.K. Federation Against Copyright Theft (FACT)

Last month, the fifth and final season of the hit television show Breaking Bad premiered in the U.S. Despite all the legal ways to view the show in the U.S. and in several other countries, many people still viewed the episode through pirate websites. In fact, within a few hours after the unauthorised copy of the episode was uploaded, 80,000 people had shared the file illegally and after 12 hours more than half a million people around the world were estimated to have downloaded the copy.

Such behaviour can have dramatic and negative economic impacts – impacts that often go unnoticed by consumers. When a producer or director is unable to score a box office hit, for example, their ability to secure backing to produce the next film is greatly diminished, setting off a chain reaction that affects the entire production ecosystem from lighting and carpentry, to catering and cinema staff – all of whom depend on the continued survival of the creative economy. Continue Reading »

Bookmark and Share

Subscribe to this category Subscribe to Smarter Security