Gottfried Leibbrandt, chief executive of the Society for Worldwide Interbank Financial Telecommunication (SWIFT), declared that he is going "on the offensive against cyber criminals." With the recent spate of cyber attacks on banks including an 81 million heist we are in dire need of a tight
Commercial organizations are fair game for cyber criminals, hactivists and terrorists. Now, the practice of mining data for intelligence and sharing it is increasingly vital for enterprises to stay ahead of threat actors and their criminal strategies and tactics.
Despite the obvious and potential benefits for public agencies to move their IT services to cloud-based infrastructure, many are understandably reluctant to be an early adopter, which some believe potentially puts data at risk. Despite that reluctance, see why many public agencies, including law
Technological innovation is creating a connected world and a smarter planet, but it’s also fueling new threats. When security experts and thought leaders couple their expertise with a full range of data, including dark data, they can create advanced human-led intelligence solutions that can act
The application of analytics and capturing information inside business documents can lead to all sorts of information for running smarter, faster and highly competitive businesses. Take a look at a few examples of how a workflow can dramatically change where and how information is collected and
Some experts have it that tens of thousands of devices are running buildings, power plants and other infrastructure in the US, and they are all connected to and part of the Internet of things (IoT). This connectivity produces many efficiencies, yet it brings the risk and fear of cybersecurity
How does your organization work to prevent insider threats? In this episode of Cyber Beat Live, listen as leading cybersecurity experts discuss pressing data security questions while describing how companies can reorient their security posture to thrive in an age in which trust seems inadequate.
The proliferation of illegal, nonprescription drugs in towns and cities across the US continues to be a major headache for law enforcement because of criminal behavior closely tied to the illicit drug trade. Discover six key points of knowledge gained by a real-life application of IBM SPSS
Sensitive information comes in many forms of nonpublic and personally identifiable information. How do organizations protect this information from attacks, fraud, threats and other nefarious activities? Get insights from cybersecurity expert, Erik Rasmussen, who offers details about the nature of
Find out how cognitive capabilities supplied by IBM Analytics solutions helped the Tennessee Highway Patrol promote traffic safety across the state, enhancing the driving experience for Tennesseans everywhere.
Governments are increasingly moving away from a one-size-fits-all model toward more personalized governing, where public services are tailored to meet the needs of residents. This type of governance is built on a firm understanding of citizens' needs, information that is best gathered directly.
Does enterprise IT in the government sector need to be so complex? Maybe not. Find out how advancements in cloud computing, open data initiatives and valuable lessons learned from smartphones and the app store model can transform analytics workloads in enterprise IT for government agencies.
Graph database technology powered by open source initiatives is helping fraud detection units catch intruders in the act of breaching data security. Tune in for an enlightening discussion of how modern approaches to analytics are bringing descriptive and predictive analytics together to help stop
Automobiles are increasingly morphing into smart cars because of highly advanced computer systems. And this enhanced technology opens new vulnerabilities making cars susceptible to hacking. Malware and viruses uploaded to a vehicle’s onboard computer can create malfunctions, disable components or,