Category Archives: Reading List

Reading List: Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection

This post covers the IBM Red Paper:  Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection (redp4826). The book is about addressing new kinds of network threats such as advanced persistent threats (APTs), stealth bots, targeted application attacks, and designer malware.  For an up-to-date understanding of the threat landscape the reader is referred… Read More »

Reading List: Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security

This post covers the IBM Redbook: Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security published in April 2013. This book provides an introduction to the IBM security framework and blueprint.  I do not cover this here because I previously covered it in my post Managing Security and Compliance in Cloud… Read More »

Reading List: Managing Security and Compliance in Cloud or Virtualized Data Centers

In this post I cover the IBM Red Book SG248082:  Managing Security and Compliance in Cloud or Virtualized Data Centers. The IBM Security Framework provides a top-level view on security: At the second level of detail IBM provides Security Blueprint. The Security Blueprint categorizes and defines security capabilities and services that are required to answer… Read More »

What are IBM CCRA and CCMP?

This entry is part 30 of 31 in the series Defining words

This entry is part 30 of 31 in the series Defining wordsThe IBM Cloud Computing Reference Architecture (CCRA) and Common Cloud Management Platform (CCMP) are useful to understanding the IBM Private Modular Cloud (CMP). CCMP includes Operational Support Systems (OSS) and Business Support Systems (BSS). At the highest level the IBM point of view can… Read More »