The Next Wave of Identity Management Must Meet the Goal of One True Identity

The third wave of the internet requires an approach to identity management that recognizes the need to share PII selectively to maximize its value.

The post The Next Wave of Identity Management Must Meet the Goal of One True Identity appeared first on Security Intelligence.

Continue reading The Next Wave of Identity Management Must Meet the Goal of One True Identity

Finding the Right Apps to Streamline Data Collection

The IBM Security App Exchange includes over 70 applications to help security teams streamline data collection and share information more efficiently.

The post Finding the Right Apps to Streamline Data Collection appeared first on Security Intelligence.

Continue reading Finding the Right Apps to Streamline Data Collection

Why Do We Care So Little About Application-Layer Protection?

In the current world of cloud and agile development, we deliver code monthly, weekly and even daily. One of my engineering teams at IBM affectionately refers to updates as the “daily dose.” We have developed robust processes to ensure that these updates are seamless and impact production minimally. But one of the major challenges is […]

The post Why Do We Care So Little About Application-Layer Protection? appeared first on Security Intelligence.

Continue reading Why Do We Care So Little About Application-Layer Protection?

Don’t Trade One Security Analytics Platform Problem for Another

I haven’t seen much love lately for security information and event management (SIEM). To steal a phrase from Gartner, the security analytics platform seems to have entered the “trough of disillusionment.” But in deploying alternatives, some enterprises may be trading one problem for another. SIEM is great in concept. These tools were introduced about a […]

The post Don’t Trade One Security Analytics Platform Problem for Another appeared first on Security Intelligence.

Continue reading Don’t Trade One Security Analytics Platform Problem for Another