Malware, BYOD & Hashing- IBM XForce to Reveal Mid-Year Security Trends in Report Available 9/20
Melissa Stevens 270005B76W MELISSAS@US.IBM.COM | | Tags:  malware security hashing password email byod mobile spam
0 Comments | 3,852 Visits
This post is courtesy of Gina Stefanelli, Manager of X-Force Marketing, IBM Security.
The Big News! X-Force Mid Year Trend & Risk Report to be released this week
Later this week, IBM X-Force will be releasing their 2012 Mid Year Trend and Risk Report. As usual it is chock-full of valuable and relevant information on the state of internet security. This world renowned team of security experts culls a variety of resources – including one of the worlds largest vulnerability databases, their global web crawler, and international spam collectors-- to compile this comprehensive report that covers a variety of topics including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.
The threat section explores the malicious activity observed by IBM X-Force and the latest attack trends they have identified. In the operational security practices section they explore weaknesses in process, software, and infrastructure targeted by today’s threats and they also present data gathered across IBM during the process of managing or mitigating these problems for its clients. In software development security practices they present processes and techniques for addressing security during software development. They share ideas around how enterprises can find existing vulnerabilities and help prevent new ones from being introduced into the environment. Finally, in the emerging trends in security section they take a look at fast-developing technology that is proving to be a challenge for those enterprises considering whether it is time to make investments in these areas.