IBM Resilient

Stay connected:

Featured Stories:

The value of colocation data centres in IoT

IoT data processing is increasingly being pushed out to the network edge to get as close as possible to the source sensors and end-users of the resulting data analytics

Strategy and anticipation are key to securing against cyber threats

With technological progress comes increased security risks. Sophisticated and co-ordinated cyber groups are working every day to find potential entry points into organisations’ networks.

Raising talent attraction and retention with IT investment

To be at the centre of talent attraction and retention, businesses should make use of workplace technology that enables them to integrate collaborative, secure and sustainable measures into their operations.

How NIST started the countdown on the long journey to quantum safety

Leading the charge to develop a post-quantum cryptographic standard for organisations is the US government’s National Institute of Standards and Technology (NIST).

Incident Response Privacy | IBM Resilient

https://vimeo.com/309471574/6b1d52b86e

Incident Enrichment | IBM Resilient

https://vimeo.com/309472599/5b374bf47e Cyber analyst have to deal with massive mountains of work and alerts. Watch as Jessica Cholerton talks you through what all of these different...

Automation In Incident Response | IBM Resilient

https://vimeo.com/309472799/36f3c151fb Jessica Cholerton joined us in the studio to speak to us about automation in incident response and the different areas that you could and should...

Mitre attack | IBM Resilient

https://vimeo.com/310593996/7a2405893c A Mitre Attack framework is a way to map the techniques used by an attacker. Craig Roberts joined us in the studio to talk...

Breaking Out Workflows part 1 & 2 | IBM Resilient

https://vimeo.com/310595628/92c196cfbf Watch as Craig Roberts discusses how they map out an incident response process and the best way to start thinking about designing such a...

Threat Intelligence Platform | IBM Resilient

https://vimeo.com/310622492/2c575e887e Craig Roberts discusses how threat intelligence platforms and security orchestration automation platforms interact with each other and draws this out in an easy to...

Subscribe

Popular articles

The value of colocation data centres in IoT

IoT data processing is increasingly being pushed out to the network edge to get as close as possible to the source sensors and end-users of the resulting data analytics

Strategy and anticipation are key to securing against cyber threats

With technological progress comes increased security risks. Sophisticated and co-ordinated cyber groups are working every day to find potential entry points into organisations’ networks.

Raising talent attraction and retention with IT investment

To be at the centre of talent attraction and retention, businesses should make use of workplace technology that enables them to integrate collaborative, secure and sustainable measures into their operations.

How NIST started the countdown on the long journey to quantum safety

Leading the charge to develop a post-quantum cryptographic standard for organisations is the US government’s National Institute of Standards and Technology (NIST).

Overcoming economic uncertainty with cloud flexibility

Particularly for companies that jumped into the cloud headfirst, taking the time to optimise existing processes is a remarkable way to reduce infrastructure costs and free up OPEX for delivering business value.

Subscribe to our Newsletter