Most post-merger cybersecurity challenges arise when the acquiring company fails to fully assess the cybersecurity posture of its acquisition target. After an acquisition, all vulnerabilities and incidents are the responsibility of the acquiring company. According to a Ponemon Institute survey, 59 percent of companies that experienced a data breach in…
Read More
Although security information and event management (SIEM) has been around for more than a decade, the solution continues to evolve. But too many enterprises still don’t know which security use cases SIEM can take on, how it can capture and leverage data — structured and unstructured, internal and external —…
Read More
Change is afoot in how organizations serving customers online can deliver fraud detection and improve the customer experience. The disruption is happening in every sector, especially banking and insurance. Growing customer expectations for immediate approval of new accounts and faster payments, for example, and a shift to real-time technology are…
Read More
As a student, I’m aware of how the security industry affects me in many ways, especially when it comes to protecting my online identity in an ever-evolving digital world. However, my marketing internship at IBM Security has opened my eyes to cybersecurity in a different way. I’ve become fascinated by…
Read More