Subscribe free to our newsletters via your
. Farming News .




CYBER WARS
IBM deepens move into computer defense
by Staff Writers
San Francisco (AFP) May 05, 2014


IBM on Monday moved deeper into defending business computers with a new service aimed at thwarting hackers before they do damage.

"The need for security to become part of our strategy has been natural," IBM vice president of security strategy Marc van Zadelhoff told AFP.

The century-old business technology titan made a priority of defending computer networks about two years ago, unifying resources from more than a dozen security firms it acquired.

IBM's computer security unit has been "growing like gangbusters," according to van Zadelhoff.

According to industry tracker IDC, IBM significantly outpaced overall computer protection company market growth and last year was the third largest seller of cyber defense software.

IBM on Monday ramped up its offerings with a Threat Protection System and a Critical Data Protection Program.

Introduction of the new cyber security weapons came with the release of IBM-funded Ponemon Institute studies showing that the number of hacker attacks is climbing along with the cost.

The average cost of a hack to a business has risen 15 percent to $6.2 million including lost revenue and productivity, according to Ponemon findings released by IBM.

The Critical Data Protection program uses an array of techniques to safeguard the data equivalent of a company's "crown jewels," according to van Zadelhoff.

IBM has tapped into intelligence about threats and hacker tactics from computer networks it cares for around the world.

Defensive technics go beyond maintaining watch-lists for known malicious codes to identifying when applications in networks act unusually and then pouncing to see whether hacker mischief is the cause.

"Traditional methods of prevention have often failed, leaving many to believe detection is the only way forward," IBM security systems general manager Brendan Hannigan said in a release.

"You must be able to prevent exploitations of known and unknown vulnerabilities."

gc/rl

IBM

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
White House report embraces 'big data,' privacy rules
Washington (AFP) May 01, 2014
A study ordered by US President Barack Obama and released Thursday concludes that analysis of "big data" can help society in many ways, from improving health care to spurring economic growth. But the report also said the vast expansion of computer analytics of large data banks creates new threats to privacy, and recommended updated rules and laws to protect stored information. "The big d ... read more


CYBER WARS
EO May Increase Survival Of 'Uncontacted' Tribes

Satellite Movie Shows US Tornado Outbreak from Space

UV-radiation data to help ecological research

NASA Goddard to Bring Satellite Data to African Agriculture

CYBER WARS
Latest Galileo satellite arrives at ESA's test centre

Glonass Failure Caused by Faulty Software

Homegrown high-precision positioning system put to use

Russia eyes building Glonass stations in 36 countries

CYBER WARS
Leaf chewing links insect diversity in modern and ancient forests

Amazon rainforest survey could improve carbon offset schemes

Untangling Brazil's controversial new forest code

Genetic legacy of rare dwarf trees is widespread

CYBER WARS
Ozone levels drop 20 percent with switch from ethanol to gasoline

Study casts doubt on climate benefit of biofuels from corn residue

Rethink education to fuel bioeconomy

Going nuts? Turkey looks to pistachios to heat new eco-city

CYBER WARS
National Bank of Canada backing Ontario solar facilities

Taking the lead out of a promising solar cell

21.2% World Record Efficiency PERC Silicon Solar Cell Using Heraeus Ag Metallization Pastes

Tin helps scientists build new cheaper solar cells

CYBER WARS
LDD completes relief drilling campaign for UK offshore wind farm

Benefits from a low-carbon economy are clear, Scotland says

E.ON anchors transformer to offshore wind farm

New Software Service Promises to Convert More Wind Into Power

CYBER WARS
China coal mine death toll rises to 20: report

Rescuers race to save 22 trapped coal miners in China: Xinhua

U.K. Coal may close two deep mines

Your money or your life: coal miner's dilemma mirrors China's

CYBER WARS
China lawyer held ahead of Tiananmen anniversary: associate

Migration steals the magic from China's mountain shamans

Church demolition illuminates China's religious tensions

US lawmaker urges China to expand religious freedoms




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.