Today's Smarter Planet is driving great opportunity for businesses around the globe.; By 2015, it's estimated that there will be one trillion connected devices, many of which will be instrumented with real-time capabilities to respond quickly and accurately to the environment. However, as the planet becomes increasingly interconnected, intelligent and instrumented, it is also creating emerging security vulnerabilities that organizations need to address.; IBM Security Solutions draws on the company's 40-years of deep security expertise in vertical industries, research, products, services, consulting and global business partners to deliver end-to-end security. IBM has nine worldwide research labs innovating security technology and nine security operations centers around the world to help global clients maintain the appropriate security posture.
Web Application Vulnerability
Date added: 22 Mar 2012
Figure 51 shows a steady decline in the instances of input control related vulnerabilities such as cross-site scripting (XSS) and SQL injection since X-Force began recording these statistics in 2007. In 2011, the statistics suggest that the likelihood of encountering XSS in a given test continues to decrease but shows signs of leveling out at approximately a 40 percent chance of occurring. Injection vulnerabilities and specifically SQL injection appears to have leveled out at around a 20 percent chance of occurring in a given test.
Mobile Operating System Exploits:
Date added: 22 Mar 2012
Figure 43 shows an increase in mobile operating system exploits in 2011 due to an uptick in malicious activity targeting mobile devices. Because of the two-tiered relationship between phone end users, telecommunications companies, and mobile operating system vendors, disclosed mobile vulnerabilities can remain unpatched on phones for an extended period of time, providing a large window of opportunity to attackers.
The Source of Greatest Risk to Sensitive Data
Date added: 27 Feb 2012
IBM and the Ponemon Institute recently conducted a survey of more than 265 C-level executives to determine what organizations believe are the most important factors when considering sensitive data and complying with strict security regulations. (credit: IBM)
Top Cyber Threats in 2011
Date added: 22 Feb 2012
This chart shows the top global cyber security threats in 2011, according to IBM analysis. (credit: IBM)
Contact(s) for the Press kit