Manjer Shaikh
Building the Future of AI Security: The IBM and Celerity Partnership
Introduction: A Story of Resilience and Innovation In the world of cybersecurity, no company is immune to risk, no matter how prepared they may seem. One prominent example was the SolarWinds breach in 2020, which demonstrated how a single vulnerability in widely used software could have far-reaching consequences across both public and private sectors. This event […]
Securing the AI Frontier: IBM’s Strategic Approach to Mitigating Risks in AI
From an obscure iPhone game developer to a central figure in a privacy firestorm, Hoan Ton-That’s Clearview AI made headlines in 2020 for all the wrong reasons. The company’s groundbreaking facial recognition technology, capable of matching faces to a vast database of images scraped from the internet, was already raising eyebrows. But when a security breach exposed Clearview AI’s client […]
Outsmarting the Digital Rogues: Celerity’s Journey to SOC Modernization
Remember SolarWinds? The software update that delivered malware to thousands? Imagine a legacy security system, slow and reliant on signatures, like a grumpy old guard dog. It barks at familiar threats, but this wolf in sheep’s clothing (the update) slipped right by. Hackers lurked undetected for months, finally wreaking havoc. Legacy defences? Powerless. Moral of […]
Securing cyber-physical systems with IBM-Exalens co-created CPDR solution
On December 23, 2015, in the heart of winter, several Ukrainian power companies were targeted by hackers in a well-planned cyberattack. Suddenly, almost a quarter-million people found themselves without electricity, and the companies affected were scrambling to restore power. This wasn’t a random malware that happened to sneak in – the attack was specifically designed […]
Are you keeping pace with evolving threat landscape?
There is no doubt that the endpoints are under attack. 83% of organizations studied have had more than one data breach according to IBM’s Cost of a Data Breach report 2022. With 84% of security professionals believing that most attacks will start with the endpoint, means that the endpoints continue to remain the primary attack vector. Breaches […]