article thumbnail

IBM and Hispanic Heritage Foundation partner to upskill Latinos for IT careers

CIO Business Intelligence

Creating opportunity is key to fostering diversity in the tech industry — and that’s what IBM is aiming to do in partnership with the Hispanic Heritage Foundation. IBM’s aim is to ensure content on the platform is engaging, interesting, and relevant to each user.

IBM 298
article thumbnail

IBM social engineer easily hacked two journalists' information

Tech Republic Security

A member of IBM's X-Force Red team hacked two CBS reporters for three weeks. Find out what information she gathered, as well as what phishing entails.

IBM 384
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How a hacker at IBM uses disguises and devices to steal private information

Tech Republic Security

An IBM X-Force Red team member explains how her background in makeup and sales helps her social engineering career. Also, she demonstrates how cybercriminals can easily clone your work ID badge.

IBM 419
article thumbnail

Streamline AI governance with AWS and IBM

CIO Business Intelligence

Companies must mitigate the ethical and social risks of AI, navigate complex and evolving regulations, and prevent operational and security failures. The IBM-AWS partnership delivers the power of a two-in-one unified offering, seamlessly integrating AI governance capabilities within your existing AI/ML operations and processes.

IBM 162
article thumbnail

How can you protect yourself from hackers? An IBM social engineer offers advice

Tech Republic Security

Stephanie "Snow" Carruthers, Chief People Hacker at IBM, gives advice about protecting yourself online. She also explains how the robocalls and spoofing process works.

IBM 319
article thumbnail

IBM: Cost of an enterprise data breach hit post-pandemic high

Network World

Some other noteworthy findings from the IBM report include: Stolen credentials topped initial attack vectors – At 16%, stolen/compromised credentials was the most common initial attack vector. For example, phishing attacks lasted an average of 261 days, while social engineering attacks took an average of 257 days.

IBM 435
article thumbnail

IBM social engineer easily hacked two journalists' information

Tech Republic Security

A member of IBM's X-Force Red team hacked two CBS reporters for three weeks. Find out what information she gathered, as well as what phishing entails.

IBM 218