IBM

Big Data Implementation: Hadoop and Beyond

The big data phenomenon is far more than a set of buzzwords and new technologies that fit into a growing niche of application areas. Further, all the hype around big data goes far beyond what many think is the key issue, which is data size. While data volume is a critical issue, the related matters

Reputational risk and IT in the insurance industry

Reputational risk and IT in the insurance industry: How security and business continuity can shape the reputation and value of your company is an IBM study that investigates how organizations around the world are managing their reputations in today’s digital era, where IT is an integral part of the organization and IT failures can result

Six keys to effective reputational and IT risk management

The IBM Global Reputational Risk and IT Study is one of the largest studies ever conducted to examine the relationship between IT and reputational risk. The initial group of 427 respondents participated in a survey conducted by the Economist Intelligence Unit on behalf of IBM. An additional 175 respondents participated in the study online at

Virtualizing disaster recovery using cloud computing

Almost from the beginning of widespread adoption of computers, organizations realized that disaster recovery was a necessary component of their information technology (IT) plans. Business data had to be backed up, and key processes like order entry, billing, payroll and procurement needed to continue even if an organization’s data center was disabled due to a

IBM Security Services Cyber Security Intelligence Index

IBM Managed Security Services continuously monitors tens of billions of events per day for more than 3,700 clients in over 130 countries. This report is based on the cyber security event data we collected between 1 April 2012 and 31 March 2013 in the course of monitoring client security devices as well as data derived

Preventing security risks in real time

As the world becomes more digitized and interconnected, the door to emerging security leaks has opened wider. Today, there are billions of RFID tags for items including products, passports, buildings and animals. With more than two billion Internet users and cellular phone subscriptions now exceeding five billion, nearly one in three people worldwide surfs the

Responding to—and recovering from—sophisticated security attacks

Like so many other things in today’s world, cyber attacks— along with those who perpetrate them—are becoming more sophisticated every year. At the same time, IT resources are moving outside the firewall and enterprises are distributing their applications and data across multiple devices. It’s now clear that simply protecting an organization’s perimeter is not enough.

Surviving The Technical Security Skills Crisis

Technical information security skills are in higher demand today than ever before. As IT environments become more complex and the threat landscape grows more malicious, organizations need skilled technical staff to meet increasing security and compliance demands. However, this has been a losing battle. IBM counted more than 137 million attempted attacks against its 3,700-plus

Holistic risk management: perspectives from IT professionals

Global organizations are increasingly emphasizing business resilience, that is, the ability to adapt rapidly to a continuously changing business environment. This movement has led to important changes in the roles of IT professionals as they become progressively more engaged in managing all types of risk confronting the organization. That was the conclusion of Key trends