IBM researchers said today they have developed software that uses optical character recognition and screen scraping to identify and cover up confidential data. According to IBM the driving idea behind ...
Tech giant IBM ($IBM) is urging customers to quickly fix a serious security flaw in its API Connect software, which is used by companies to manage ...
The IBM security software leader tells CRN that with the coming transition to post-quantum cryptography, it will ultimately be a much bigger ordeal than Y2K. Comparisons abound between the looming ...
IBM is launching IBM Guardium Data Security Center—allowing organizations to protect data in any environment, throughout its full lifecycle, and with unified controls. IBM Guardium Data Security ...
To continue reading this content, please enable JavaScript in your browser settings and refresh this page. IBM on Thursday said it's reached an agreement to acquire ...
IBM today unveiled a new mainframe, bringing the security of data encryption without slowing down system performance to mid-sized organizations. The new system, IBM z13s, is enabled and optimized for ...
International Business Machines is selling its cloud-based QRadar cybersecurity software to Palo Alto Networks as the two technology companies deepen their partnership in jointly selling and ...
IBM (IBM) has acquired Encentuate Inc., a Redwood City, Calif.-based provider of identity and access management software. No financial terms were disclosed. Encentuate had raised $18.2 million in VC ...
ARMONK, NY - 17 Jul 2017: IBM (NYSE: IBM) today unveiled IBM Z, the next generation of the world’s most powerful transaction system, capable of running more than 12 billion encrypted transactions per ...
India-based global solution provider HCL Technologies on Thursday said it is acquiring a large part of IBM's software portfolio as a way to beef up its software business and its as-a-service ...
Daniel Crowley has a long list of software platforms, computers, and internet-of-things devices that he suspects he could hack. As research director of IBM’s offensive security group X-Force Red, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results