Case Study

“Ransomware attacks have reached the point where governments need to place an importance on them and develop response plans, similar to how they handle states of emergency.”

— Wendi Whitmore, Vice President X-Force Threat Intelligence, IBM Security

Added:
Report

This year’s IBM Security X-Force Threat Intelligence Index presents an uncomfortable truth: as businesses, institutions and governments continue to adapt to a fast-changing global market—including hybrid and cloud-based work environments — threat actors remain adept at exploiting such shifts.

Added:
eBook

Elastic, Splunk, and Devo are all considered market-leading centralized log management solutions. All three also have SIEM components. So, how do the three stack up against each other? Which one should you choose? The best way to get a true apples to-apples comparison of cost, functionality, and performance is to evaluate each vendor’s SaaS offering.

Added:
Other

The IBM X-Force team offers security services to help secure and modernize critical infrastructure security. X-Force’s offensive and defensive security services can help organizations fulfill the executive order, comply with NIST best practices, and reduce the risk of a ransomware or other attack succeeding. 

Added:
Report

The IBM Security X-Force Threat Intelligence Index maps new trends and attack patterns we observed and analyzed from our data—drawing from billions of datapoints ranging from network and endpoint detection devices, incident response (IR) engagements, domain name tracking and more. This report represents the culmination of that research based on data collected from January to December 2021.

Added:
Webinar

New technologies, threats, and contested domains are challenging the intelligence community as never before. How will leaders manage the global intelligence needs of today and tomorrow? During this virtual summit, Defense One and Nextgov will interview experts in the field to explore emerging dynamics, long-term trends, and policy options facing the intelligence community in 2022 and beyond.

Added:
Case Study

Federal money is on its way. Now state and local governments need to get results.

Added:
Case Study

Keep remote employees productive and free from malware.

Added:
Webinar

Government agencies are facing growing number of risks to their supply chains, including cyber risk. In 2020, one of the most significant cyber attacks in recent memory targeted software company SolarWinds in an effort to gain access to its important customers, including government agencies. Since that incident occurred, many government agencies have started developing programs to reduce the likelihood of a future incident targeting their supply chain partners and vendors.

Added:
Market Intelligence

This Sales Intelligence Briefing provides the basics of the federal government’s Zero Trust frameworks, as well as insights into upcoming milestones, insertion points, and implementation plans.

Added:
Webinar

Last year was a volatile year in the cybersecurity arena, with both national and global events coalescing to provide threat actors with opportunity on an unprecedented scale. Attend this session to get a fresh lens on the biggest cyber risks affecting the threat landscape today and learn the top security tips and trends organizations are doing to adapt to our new normal.

Added:
Whitepaper

The IBM Center for The Business of Government, we are pleased to publish this new report, Artificial Intelligence in the Public Sector: A Maturity Model, by Kevin Desouza Professor of Business, Technology and Strategy at Queensland University of Technology.

Added:
Report

Explore a simplified cloud experience. Discover solutions and get a no-cost consultation with our innovation experts.

Added:
eBook

The question on the table is, what exactly is a next-gen SIEM? Many vendors, including legacy SIEM providers, lay claim to the “next-gen” label. How can you tell the difference between a legacy SIEM and a true next-gen SIEM? And what criteria should you use to evaluate vendors?

Added:
Report

The 2021 Devo SOC Performance Report™ shows that security operations centers — and those who work in them — continue to have a number of challenges to overcome. This year’s report provides fresh insights about what separates high- and low-performing SOCs.

Added: