Category: IBM Cloud

Security Based on Open Source

A New Era of Security Based on Open Source Technology and Standards

IBM Cloud Pak for Security is a platform that integrates your existing security tools to offer deeper insights into threats across hybrid multicloud environments, using an infrastructure-independent common operating environment that runs anywhere. Cloud Pak for Security connects all your data sources-helping you uncover hidden threats and make more informed, risk-based decisions-while leaving the data where it resides. Finally, IBM Cloud Pak for Security is built on open, cloud native technology that is pre-integrated with Red Hat OpenShift.

Defragmentation of security with a platform approach

During a recent webinar with Joseph Blankenship, Vice President and Director of Research at Forrester Research, and James Murphy, Senior Offering Manager at IBM Security, I had the opportunity to chat about the complexity of today's security landscape. After discussing common security challenges and possible solutions, and examining security platforms in detail, Murphy gave an overview of how IBM tackles security complexity with IBM Cloud Pak for Security, a security platform that helps security professionals identify hidden threats, make informed, risk-based decisions, and prioritize team time. The webinar we recorded includes a quick demonstration of Cloud Pak for Security so viewers can see it in action and better understand how the platform brings security data and workflows together into a unified experience without the need for data migration.
Security Best Practices

Security Best Practices for Web Application

Incorporating security best practices for the security of web applications during application development can plug some of these holes and ensure that applications meet security standards and are free of vulnerabilities. Some common types of security headers are HTTP-strict transport security HSTS, X-XSS protection, X-content-type-options, X-frame-options and Content-Security-Policy. You will find many security tools for web applications that can identify security risks in code with SAST. However, SAST can give a lot of false positive results, so analyze and filter the results carefully so that you can fix the real problems. Many cloud security tools focus on the use of real-time data, but not on historical data stored deep in archives. Best security practices for historical data include improved data classification to identify different sensitivities and develop policies to prevent data loss in order to have an action plan in case of a data breach.
Security Data

Security Data With Multicloud Environment

Security is a shared responsibility between vendor and customer, with even more responsibility going to the customer with a platform as Service PaaS or infrastructure as Service IaaS. Learn exactly what protects the vendor's security and work with them to find the right security tools to protect your data and applications. Many cloud security tools focus on the use of real-time data, but not on historical data stored deep in archives. Best security practices for historical data include improved data classification to identify different sensitivities and develop policies to prevent data loss in order to have an action plan in case of a data breach.
Data Security
RPA
IBM RPA
Skip to content