As a student, I’m aware of how the security industry affects me in many ways, especially when it comes to protecting my online identity in an ever-evolving digital world. However, my marketing internship at IBM Security has opened my eyes to cybersecurity in a different way. I’ve become fascinated by…
Read More
Just when you thought you had enough to keep you up at night, there’s another threat to add to the list of enterprise security nightmares lurking under the bed. The deepfake, once a threat only to celebrities, has now transcended into the realm of potential risks to the organization. According…
Read More
This is the last installment in a three-part series. Be sure to read part one and part two to catch up on the full story. Going live with your fraud protection solution should be a strategic process, enabling smooth transitions and positive outcomes. This continuation of your ongoing relationship with…
Read More
The French writer Jean-Baptiste Alphonse Karr once said, “Plus ça change, plus c’est la même chose,” which translates to, “The more things change, the more they stay the same.” What does this have to do with the industrial internet of things (IIoT)? Clean water and reliable power are two elements…
Read More