Subscribe free to our newsletters via your
. Nuclear Energy News .




CYBER WARS
IBM deepens move into computer defense
by Staff Writers
San Francisco (AFP) May 05, 2014


IBM on Monday moved deeper into defending business computers with a new service aimed at thwarting hackers before they do damage.

"The need for security to become part of our strategy has been natural," IBM vice president of security strategy Marc van Zadelhoff told AFP.

The century-old business technology titan made a priority of defending computer networks about two years ago, unifying resources from more than a dozen security firms it acquired.

IBM's computer security unit has been "growing like gangbusters," according to van Zadelhoff.

According to industry tracker IDC, IBM significantly outpaced overall computer protection company market growth and last year was the third largest seller of cyber defense software.

IBM on Monday ramped up its offerings with a Threat Protection System and a Critical Data Protection Program.

Introduction of the new cyber security weapons came with the release of IBM-funded Ponemon Institute studies showing that the number of hacker attacks is climbing along with the cost.

The average cost of a hack to a business has risen 15 percent to $6.2 million including lost revenue and productivity, according to Ponemon findings released by IBM.

The Critical Data Protection program uses an array of techniques to safeguard the data equivalent of a company's "crown jewels," according to van Zadelhoff.

IBM has tapped into intelligence about threats and hacker tactics from computer networks it cares for around the world.

Defensive technics go beyond maintaining watch-lists for known malicious codes to identifying when applications in networks act unusually and then pouncing to see whether hacker mischief is the cause.

"Traditional methods of prevention have often failed, leaving many to believe detection is the only way forward," IBM security systems general manager Brendan Hannigan said in a release.

"You must be able to prevent exploitations of known and unknown vulnerabilities."

gc/rl

IBM

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
White House report embraces 'big data,' privacy rules
Washington (AFP) May 01, 2014
A study ordered by US President Barack Obama and released Thursday concludes that analysis of "big data" can help society in many ways, from improving health care to spurring economic growth. But the report also said the vast expansion of computer analytics of large data banks creates new threats to privacy, and recommended updated rules and laws to protect stored information. "The big d ... read more


CYBER WARS
Ozone levels drop 20 percent with switch from ethanol to gasoline

Study casts doubt on climate benefit of biofuels from corn residue

Rethink education to fuel bioeconomy

Going nuts? Turkey looks to pistachios to heat new eco-city

CYBER WARS
National Bank of Canada backing Ontario solar facilities

Taking the lead out of a promising solar cell

21.2% World Record Efficiency PERC Silicon Solar Cell Using Heraeus Ag Metallization Pastes

Tin helps scientists build new cheaper solar cells

CYBER WARS
LDD completes relief drilling campaign for UK offshore wind farm

Benefits from a low-carbon economy are clear, Scotland says

E.ON anchors transformer to offshore wind farm

New Software Service Promises to Convert More Wind Into Power

CYBER WARS
Energy-subsidy reform can be achieved with proper preparation, outside pressure

Siemens to buy Rolls Royce energy assets for 950 mn euro

Iran, Russian energy deal frustrates U.S. government

U.S. Energy Department renews focus on grid security

CYBER WARS
Breaking up water: Controlling molecular vibrations to produce hydrogen

Sweden's Vattenfall abandons research on CO2 storage

Iraq oil exports rebound but sales hit by attacks

Angola's potential 'enormous,' U.S. Secretary of State Kerry says

CYBER WARS
Length of Exoplanet Day Measured for First Time

Spitzer and WISE Telescopes Find Close, Cold Neighbor of Sun

Alien planet's rotation speed clocked for first time

Seven Samples from the Solar System's Birth

CYBER WARS
Russia to reinforce Crimea fleet: minister

Russia marks key stage in joint France warship project

U.S. Navy getting additional fast attack submarines

Navy exercises contract option with BAE Systems

CYBER WARS
Target on Mars Looks Good for NASA Rover Drilling

Mars Rover Switches to Driving Backwards Due to Elevated Wheel Currents

Mission to Mars

Traces of recent water on Mars




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.