Subscribe free to our newsletters via your
. Space Industry and Business News .




CYBER WARS
IBM deepens move into computer defense
by Staff Writers
San Francisco (AFP) May 05, 2014


IBM on Monday moved deeper into defending business computers with a new service aimed at thwarting hackers before they do damage.

"The need for security to become part of our strategy has been natural," IBM vice president of security strategy Marc van Zadelhoff told AFP.

The century-old business technology titan made a priority of defending computer networks about two years ago, unifying resources from more than a dozen security firms it acquired.

IBM's computer security unit has been "growing like gangbusters," according to van Zadelhoff.

According to industry tracker IDC, IBM significantly outpaced overall computer protection company market growth and last year was the third largest seller of cyber defense software.

IBM on Monday ramped up its offerings with a Threat Protection System and a Critical Data Protection Program.

Introduction of the new cyber security weapons came with the release of IBM-funded Ponemon Institute studies showing that the number of hacker attacks is climbing along with the cost.

The average cost of a hack to a business has risen 15 percent to $6.2 million including lost revenue and productivity, according to Ponemon findings released by IBM.

The Critical Data Protection program uses an array of techniques to safeguard the data equivalent of a company's "crown jewels," according to van Zadelhoff.

IBM has tapped into intelligence about threats and hacker tactics from computer networks it cares for around the world.

Defensive technics go beyond maintaining watch-lists for known malicious codes to identifying when applications in networks act unusually and then pouncing to see whether hacker mischief is the cause.

"Traditional methods of prevention have often failed, leaving many to believe detection is the only way forward," IBM security systems general manager Brendan Hannigan said in a release.

"You must be able to prevent exploitations of known and unknown vulnerabilities."

gc/rl

IBM

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
White House report embraces 'big data,' privacy rules
Washington (AFP) May 01, 2014
A study ordered by US President Barack Obama and released Thursday concludes that analysis of "big data" can help society in many ways, from improving health care to spurring economic growth. But the report also said the vast expansion of computer analytics of large data banks creates new threats to privacy, and recommended updated rules and laws to protect stored information. "The big d ... read more


CYBER WARS
Sierra Nevada Corporation Completes and Delivers Satellites for ORBCOMM Mission 1 Launch

Edgy Look at 2D Molybdenum Disulfide

High-Strengh Materials from the Pressure Cooker

Faster Dental Treatment with New Photoactive Molecule

CYBER WARS
Testing facility paves way for more radio connections to MUOS satellites

LGS Innovations completes upgrade of Army communications center in Kuwait

DISA Awards Northrop Grumman contract for Joint Command and Control System

AFSPC cuts ribbon for new network operations center

CYBER WARS
Second O3b satellite cluster delivered for upcoming Arianespace Soyuz launch

Court blocks US plan to buy Russian rocket engines

Arianespace to launch Indonesia satellite BRIsat

It's a "go" for Arianespace's Vega launch with Kazakhstan's first Earth observation satellite

CYBER WARS
Latest Galileo satellite arrives at ESA's test centre

Glonass Failure Caused by Faulty Software

Homegrown high-precision positioning system put to use

Russia eyes building Glonass stations in 36 countries

CYBER WARS
Production Configuration AH-6i Light Helicopter for the First Time

U-2 spy plane linked to US air traffic meltdown

NGC Delivers Mode S Upgrade for the UK's Sentry AWACS System

Sikorsky officially unveils CH-53K

CYBER WARS
Molecular Foundry Opens the Door to Better Doping of Semiconductor Nanocrystals

US chip giant Intel to pump $6 bn into Israel: minister

Progress made in developing nanoscale electronics

Piezotronics and piezo-phototronics leading to unprecedented active electronics and optoelectronics

CYBER WARS
EO May Increase Survival Of 'Uncontacted' Tribes

Satellite Movie Shows US Tornado Outbreak from Space

UV-radiation data to help ecological research

NASA Goddard to Bring Satellite Data to African Agriculture

CYBER WARS
UNESCO condemns dredge waste dumping in Barrier Reef waters

US top court upholds cross-state air pollution rule

China toughens environment law to target polluters

The result of slow degradation




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.