Professional Documents
Culture Documents
Security
Products
Solutions
Services
Learn
Explore More
What is cybersecurity?
Cybersecurity technology and best practices protect critical systems and sensitive
information from an ever-growing volume of continually evolving threats
● What is cybersecurity?
● Cybersecurity domains
● Dangerous cybersecurity myths
● Common cyber threats
● Key cybersecurity technologies and best practices
● Zero trust security strategy
● Cybersecurity and IBM
● Solutions
● Resources
What is cybersecurity?
Cybersecurity is the practice of protecting critical systems and sensitive information
from digital attacks. Also known as information technology (IT) security, cybersecurity
measures are designed to combat threats against networked systems and applications,
whether those threats originate from inside or outside of an organization.
In 2020, the average cost of a data breach was USD 3.86 million globally, and USD
8.64 million in the United States. These costs include the expenses of discovering and
responding to the breach, the cost of downtime and lost revenue, and the long-term
reputational damage to a business and its brand. Cybercriminals target customers’
personally identifiable information (PII) — names, addresses, national identification
numbers (e.g., Social Security number in the US, fiscal codes in Italy), and credit card
information — and then sell these records in underground digital marketplaces.
Compromised PII often leads to a loss of customer trust, the imposition of regulatory
fines, and even legal action.
Cybersecurity domains
A strong cybersecurity strategy has layers of protection to defend against cyber crime,
including cyber attacks that attempt to access, change, or destroy data; extort money
from users or the organization; or aim to disrupt normal business operations.
Countermeasures should address:
● Cloud security - Specifically, true confidential computing that encrypts cloud data
at rest (in storage), in motion (as it travels to, from and within the cloud) and in
use (during processing) to support customer privacy, business requirements and
regulatory compliance standards.
● Information security - Data protection measures, such as the General Data
Protection Regulation or GDPR, that secure your most sensitive data from
unauthorized access, exposure, or theft.
● Storage security - IBM FlashSystem® delivers rock solid data resilience with
numerous safeguards. This includes encryption and immutable and isolated data
copies. These remain in the same pool so they can quickly be restored to support
recovery, minimizing the impact of a cyber attack.
● Mobile security - IBM Security® MaaS360 with Watson enables you to manage
and secure your mobile workforce with app security, container app security and
secure mobile mail.
● Identity and access management (IAM) defines the roles and access privileges
for each user, as well as the conditions under which they are granted or denied
their privileges. IAM methodologies include single sign-on, which enables a user
to log in to a network once without re-entering credentials during the same
session; multifactor authentication, requiring two or more access credentials;
privileged user accounts, which grant administrative privileges to certain users
only; and user lifecycle management, which manages each user's identity and
access privileges from initial registration through retirement. IAM tools can also
give your cybersecurity professionals deeper visibility into suspicious activity on
end-user devices, including endpoints they can’t physically access. This helps
speed investigation and response times to isolate and contain the damage of a
breach.
For help with risk assessment, incident detection, and threat response, be sure to check
out:
● IBM X-Force Exchange (link resides outside of ibm.com) for global threat
intelligence
● IBM Security Services for cybersecurity strategy alignment
● IBM Security Command Center for deep cyber range experience
For the latest cybersecurity strategies, trends and insights from IBM Security experts,
visit the IBM Security Intelligence (link resides outside of ibm.com) site.
Learn more about IBM Security products and services
Solutions
IBM Cloud Pak® for Security
Integrate security tools to gain insights into threats across hybrid, multicloud
environments.
● Learn about IBM Cloud Pak for Security
AI and cybersecurity
AI is changing the game for cybersecurity, analyzing massive quantities of risk data to
speed response times and augment under-resourced security operations.
● AI and Cybersecurity
Resources
The Cost of a Data Breach Report explores financial impacts and security measures
that can help your organization avoid a data breach, or in the event of a breach, mitigate
costs.
Cyber threats report
Read the X-Force Threat Intelligence Index to understand the threat landscape and get
recommendations to help you bolster your security strategy for the future.
Cybersecurity Tutorials for Devs
Stay up-to-date on the latest best practices to help protect your network and data.
Identity Access Management
In these times, it’s critical that we ensure the right people can use the right applications
or data when they need to. IAM allows this to happen.
IBM Office of CIO
Learn why the IBM CIO office turned to IBM Security Verify for next-generation digital
authentication across its workforce and clients.
Commercial International Bank
Read how Commercial International Bank modernized its digital security with IBM
Security solutions and consulting to create a security-rich environment for the
organization.
● Products &
Solutions
● Top products &
platformsIndustriesArtificial
intelligenceBlockchainBusiness
operationsCloud
computingData &
AnalyticsHybrid cloudIT
infrastructureSecuritySupply
chain
Learn about
● What is Hybrid Cloud?What is
Artificial intelligence?What is
Cloud Computing?What is
Kubernetes?What are
Containers?What is
DevOps?What is Machine
Learning?
Popular links
● IBM
ConsultingCommunitiesDevelo
per educationSupport -
Download fixes, updates &
driversIBM ResearchPartner
with us - PartnerWorldTraining
- CoursesUpcoming events &
webinars
About IBM
● Annual reportCareer
opportunitiesCorporate social
responsibilityDiversity &
inclusionIndustry analyst
reportsInvestor relationsNews
& announcementsThought
leadershipSecurity, privacy &
trustAbout IBM
Follow IBM
LinkedInTwitterInstagramSubscription
Center
Contact IBMPrivacyTerms of
useAccessibilityCookie Preferences
Let’s talk
ID–En