• Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
Saturday, May 2, 2026
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
No Result
View All Result

Home » IBM Warns that Security Vulnerabilities Reach Record Levels

IBM Warns that Security Vulnerabilities Reach Record Levels

August 24, 2010
in Uncategorized
A A

A newly published study from IBM has found that vulnerability disclosures are increasing dramatically, having reached record levels for the first half of 2010.

IBM’s X-Force 2010 Mid-Year Trend and Risk Report found that Web application vulnerabilities continued to be the leading threat, accounting for more than half of all public disclosures. In addition, covert attacks increased in complexity hidden within JavaScript and Portable Document Formats (PDFs), while cloud computing and virtualization were noted as key future security topics for enterprise organizations.

IBM warns that the sophisticated attackers are employing covert means to break into networks without being detected by traditional security tools. IBM detected a 52 percent increase in obfuscated JavaScript attacks during the first half of 2010 versus the same period in 2009.

On the positive side, phishing activity declined by also 82% from its peak in 2009, but financial institutions remain the top target.

“Threat dynamics continue to multiply and evolve at a furious pace, making it more crucial than ever to look at unfolding trends so we can better prepare our clients for the future,” said Steve Robinson, general manager, IBM Security Solutions. “This year’s X-Force report reveals that although threats are on the rise, the industry as a whole is getting much more vigilant about reporting vulnerabilities. This underscores the increased focus among our clients to continue looking for security solutions that help them better manage risk and ensure their IT infrastructure is secure by design.”http://www.ibm.com

Tags: AllService Providers
ShareTweetShare
Previous Post

VSS Monitoring Raises $20 Million for its Distributed Taps

Next Post

Taiwan's Chunghwa Sees Further FTTx Substitution for ADSL

Staff

Staff

Related Posts

Blueprint: Building wholesale networks with OTN
All

Blueprint: Building wholesale networks with OTN

December 20, 2022
Huawei and Orange achieve 157 Tbps over 120km fiber link

Huawei and Orange achieve 157 Tbps over 120km fiber link

December 20, 2022
Oracle opens cloud region in Chicago
All

Oracle opens cloud region in Chicago

December 20, 2022
BT trials C-RAN in Leeds
All

BT trials C-RAN in Leeds

December 19, 2022
BT to combine Enterprise and Global units to create BT Business

BT to combine Enterprise and Global units to create BT Business

December 19, 2022
euNetworks appoints Stephanie Lynch-Habib to President

euNetworks appoints Stephanie Lynch-Habib to President

December 19, 2022
Next Post

AT4 Wireless Establishes LTE Test Lab in Taiwan

Please login to join discussion

Categories

  • 5G / 6G / Wi-Fi
  • AI Infrastructure
  • All
  • Automotive Networking
  • Blueprints
  • Clouds and Carriers
  • Data Centers
  • Enterprise
  • Explainer
  • Feature
  • Financials
  • Last Mile / Middle Mile
  • Legal / Regulatory
  • Optical
  • Quantum
  • Research
  • Security
  • Semiconductors
  • Space
  • Start-ups
  • Subsea
  • Sustainability
  • Video
  • Webinars

Archives

Tags

5G All AT&T Australia AWS Blueprint columns BroadbandWireless Broadcom China Ciena Cisco Data Centers Dell'Oro Ericsson FCC Financial Financials Huawei Infinera Intel Japan Juniper Last Mile Last Mille LTE Mergers and Acquisitions Mobile NFV Nokia Optical Packet Systems PacketVoice People Regulatory Satellite SDN Service Providers Silicon Silicon Valley StandardsWatch Storage TTP UK Verizon Wi-Fi
Converge Digest

A private dossier for networking and telecoms

Follow Us

  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

No Result
View All Result
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Go to mobile version