IBM X-Force Says Mobile Vulnerabilities Are Here and Growing

IBM released the results of its X-Force 2011 Mid-Year Trend and Risk Report finding that the security landscape is ridden with high-profile attacks, mobile vulnerabilities and more sophisticated threats such as “whaling.” The report is based on intelligence gathered through IBM’s research including monitoring and analyzing 12 billion security events since the beginning of 2011.

The trend of bringing mobile devices to work is growing and with it, the vulnerability and risk of security issues. X-Force projects that 2011 will see double the amount of 2010 mobile exploits and has recommended that IT teams consistently employ anti-malware for phones.

“For years, observers have been wondering when malware would become a real problem for the latest generation of mobile devices,” said Tom Cross, manager of Threat Intelligence and Strategy for IBM X-Force. “It appears that the wait is over.”  

Not only are mobile attacks an increased concern, but it seems attacks and network compromises are two with critical vulnerabilities tripled in 2011, according to X-Force. This includes whaling, attacks from hacktivists, anonymous proxies and Advanced Persistent Threats. 

“The rash of high-profile breaches this year highlights the challenges organizations often face in executing their security strategy,” said Cross. “Although we understand how to defend against many of these attacks on a technical level, organizations don’t always have the cross-company operational practices in place to protect themselves.” 

Additionally, IBM is opening the Institute for Advanced Security for Asia Pacific joining the IBM Institutes in North America and Europe. The center will assist in combat against security risks and create collaboration amongst security leaders. 

Additionally, IBM is opening the 

email
Filed in: Cyber, Industry News, Mobility Tags: , , , , , , , ,

You might like:

IBM Unveils OpenStack Gov’t Cloud Services Suite; Angel Diaz Comments IBM Unveils OpenStack Gov’t Cloud Services Suite; Angel Diaz Comments
Bob Griffin: IBM i2 Criminal Investigation Software Analyzes Data Relationships Bob Griffin: IBM i2 Criminal Investigation Software Analyzes Data Relationships
Tom Frana: ViON DataAdapt Analytics Tool Built to Find Insider Threats Tom Frana: ViON DataAdapt Analytics Tool Built to Find Insider Threats
IBM’s Andy Maner: Pentagon Seeks ‘Implemented System’ for EHR Project IBM’s Andy Maner: Pentagon Seeks ‘Implemented System’ for EHR Project
© 2014 ExecutiveBiz. All rights reserved.