infotechlead
infotechlead

IBM launches X-Force Red team to spot security vulnerabilities

IBM Corporation

IBM launched X-Force Red, a group of security professionals and ethical hackers, to help businesses discover vulnerabilities in their computer networks, hardware, and software applications.

The team, part of IBM Security Services, will also examine human security vulnerabilities in daily processes and procedures that attackers often use to circumvent security controls.

The enterprise IT vendor said the new team will be led by IBM’s Charles Henderson.  The team includes expertise from multiple industries like healthcare, financial services, retail, manufacturing and the public sector.

They have conducted security tests for the world’s largest brands and governments including penetration testing, ethical hacking, social engineering, and physical security testing.

The tests found malicious attacks against corporate assets are on the rise, with 64 percent more security incidents reported in 2015 than in 2014.

It was also revealed that 33 percent of companies do not test mobile applications for security vulnerabilities.

“Having a machine scan your servers and source code is a great step to help prevent data breaches, but the human element of security testing cannot be overlooked,” said Charles Henderson, Global Head of Security Testing and X-Force Red, IBM Security.

“IBM X-Force Red gives organizations the freedom to stay agile without creating blind spots in their security posture,” Henderson added.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest

More like this
Related

Microsoft Teams Vulnerabilities Exposed: How Attackers Exploit Trust in Collaboration

New research by Check Point Research has revealed critical...

Netcore Cloud Data Exposure: 40 bn Email Records, 13.4 TB Left Publicly Accessible

A major data exposure discovered on October 16, 2025...

Leading AI-Driven Security Operations Center (SOC) Platforms: Vendors, Customers, Achievements, and Challenges

The evolution of cybersecurity has made traditional Security Operations...