Subscribe free to our newsletters via your
. Medical and Hospital News .




CYBER WARS
IBM deepens move into computer defense
by Staff Writers
San Francisco (AFP) May 05, 2014


IBM on Monday moved deeper into defending business computers with a new service aimed at thwarting hackers before they do damage.

"The need for security to become part of our strategy has been natural," IBM vice president of security strategy Marc van Zadelhoff told AFP.

The century-old business technology titan made a priority of defending computer networks about two years ago, unifying resources from more than a dozen security firms it acquired.

IBM's computer security unit has been "growing like gangbusters," according to van Zadelhoff.

According to industry tracker IDC, IBM significantly outpaced overall computer protection company market growth and last year was the third largest seller of cyber defense software.

IBM on Monday ramped up its offerings with a Threat Protection System and a Critical Data Protection Program.

Introduction of the new cyber security weapons came with the release of IBM-funded Ponemon Institute studies showing that the number of hacker attacks is climbing along with the cost.

The average cost of a hack to a business has risen 15 percent to $6.2 million including lost revenue and productivity, according to Ponemon findings released by IBM.

The Critical Data Protection program uses an array of techniques to safeguard the data equivalent of a company's "crown jewels," according to van Zadelhoff.

IBM has tapped into intelligence about threats and hacker tactics from computer networks it cares for around the world.

Defensive technics go beyond maintaining watch-lists for known malicious codes to identifying when applications in networks act unusually and then pouncing to see whether hacker mischief is the cause.

"Traditional methods of prevention have often failed, leaving many to believe detection is the only way forward," IBM security systems general manager Brendan Hannigan said in a release.

"You must be able to prevent exploitations of known and unknown vulnerabilities."

gc/rl

IBM

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
White House report embraces 'big data,' privacy rules
Washington (AFP) May 01, 2014
A study ordered by US President Barack Obama and released Thursday concludes that analysis of "big data" can help society in many ways, from improving health care to spurring economic growth. But the report also said the vast expansion of computer analytics of large data banks creates new threats to privacy, and recommended updated rules and laws to protect stored information. "The big d ... read more


CYBER WARS
Philippine typhoon survivors still struggling: Red Cross

Four held over deadly bridge collapse in China: Xinhua

US airmen aid burned Chinese sailors in high seas rescue

Afghan authorities seek new homes for landslide refugees

CYBER WARS
Latest Galileo satellite arrives at ESA's test centre

Glonass Failure Caused by Faulty Software

Homegrown high-precision positioning system put to use

Russia eyes building Glonass stations in 36 countries

CYBER WARS
Rocks lining Peruvian desert pointed to ancient fairgrounds

Autism risk is half genetic, half environmental: study

ASU scientists take steps to unlock the secrets to the fountain of youth

DNA 'Sat Nav' directs you to your ancestor's home

CYBER WARS
Light-sensitive "eyes" in plants

Scientists saving Darwin finches one pesticide-soaked cotton ball at a time

Spanish island fights snake invasion

New atom-scale knowledge on the function of biological photosensors

CYBER WARS
Scientists confirm new bird flu in South Pole penguins

China study improves understanding of disease spread

Decrease in large wildlife drives rodent-borne diseases

Mystery of the pandemic flu virus of 1918 solved by University of Arizona researchers

CYBER WARS
China lawyer held ahead of Tiananmen anniversary: associate

Migration steals the magic from China's mountain shamans

Church demolition illuminates China's religious tensions

US lawmaker urges China to expand religious freedoms

CYBER WARS
Chinese worker kidnapped in Malaysia's Borneo island

Vietnam says 7 killed in shooting on China border

Kidnappers demand $11 mln for Chinese tourist

Malaysia kidnappers telephone Chinese victim's family

CYBER WARS
China hikes state firms' dividend payments

Owning a home still beats renting

Chinese underwhelmed by 'world's No. 1 economy' data

China poised to overtake US economy: World Bank ranking




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.