Тёмный

Cybersecurity Architecture: Data Security 

IBM Technology
Подписаться 765 тыс.
Просмотров 39 тыс.
50% 1

IBM Security QRadar EDR : ibm.biz/BdyJLn
IBM Security X-Force Threat Intelligence Index 2023: ibm.biz/BdyJLp
Many companies refer to their data as the "crown jewels" for a reason - it represents one of a company's most valuable assets. That's also why preventing a data breach should be at the top of your security priorities. In this video, IBM Distinguished Engineer and Adjunct Professor lays out the concerns of data security and explains the processes you should have in place to discover, secure, and govern your data across your enterprise.
Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #datasecurity

Опубликовано:

 

8 июн 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 24   
@kemsthegreat
@kemsthegreat 5 месяцев назад
Jeff proves his Ph.D. well. He explained these topics in a way everyone can understand. Not dumbed down.
@jeffcrume
@jeffcrume 4 месяца назад
Thank you for the kind words!
@hunter5701
@hunter5701 Месяц назад
Love this whole series. I'm a senior consultant at a major cybersecurity company and this has given me a knowledge roadmap. Thank you so much.
@jeffcrume
@jeffcrume Месяц назад
You’re very welcome!
@atocampoari8575
@atocampoari8575 10 месяцев назад
Ever since i took a course on cybersecurity by IBM...your ability to simplify complex and lengthy content is so smooth and easy to grasp....you are now my favourite teacher😎🔥
@jeffcrume
@jeffcrume 10 месяцев назад
Very nice of you to say so! I’m really glad you are enjoying the videos!
@gavbam
@gavbam 6 месяцев назад
Kudos to the instructor, now only was the content engaging but kept to the content without going down the path of blowing his own trumpet on every topic. Thank you for the clear and concise information.
@jeffcrume
@jeffcrume 4 месяца назад
Thank you for the kind complements!
@billyfoster3223
@billyfoster3223 5 месяцев назад
Great video series! This is helping me with my cybersecurity studies! Thanks!😁👍
@jeffcrume
@jeffcrume 4 месяца назад
As a teacher, I love hearing this!
@kent_calvin
@kent_calvin 10 месяцев назад
My favourite teacher is back 🎉
@jeffcrume
@jeffcrume 10 месяцев назад
Thanks so much for the kind words! 😊
@materubass
@materubass 10 месяцев назад
Awesome video. When it comes to data protection one topic that is sometimes overlooked is encryption for data-in-use. There are technologies such as Redis that tend to put data in-memory (a place that is not always encrypted by default) which could be subject to memory dumps where sensitive data as well as encryption keys could be extracted from. Thankfully Intel and AMD have improved memory protection (TME and SME) in their latest processors families enabling encryption for data-in-use.
@rafaelkss2009
@rafaelkss2009 10 месяцев назад
great series
@tomahs9823
@tomahs9823 10 месяцев назад
Great Video!
@pankaj16octdogra
@pankaj16octdogra 10 месяцев назад
Nice presentation
@srivasala4080
@srivasala4080 10 месяцев назад
Super👌
@LutherDrucker
@LutherDrucker 23 дня назад
Love to learn these kind of architecture!! Also just got to know about a Irys which is world only provenance layer that is making buzz all around do you know about it !!
@WilhelmPendragon
@WilhelmPendragon 2 месяца назад
So if your company’s total value is below 4.35M, a data breach has already eliminated your company?
@jeffcrume
@jeffcrume 2 месяца назад
Not likely. That’s the AVERAGE cost for ALL companies. Your situation can always vary
@user-tk7xt3wq8r
@user-tk7xt3wq8r 6 месяцев назад
10:00 🗃️📚📝
@user-gd4wt6oi7y
@user-gd4wt6oi7y 20 дней назад
Everything fails before the first line of security which should come with all electronic tech gadgets and servers, now what are those? How should it be made that hackers even if they chew their hair to the end cannot, it is in the coding programming language creating firewalls and..... No. I am not telling till I do not get a good with my integrity partner... Hackers already have broken into set firewalls sold outside by buying them and hacking them, so are useless since ages,I have been so hassled in this arena my online life is blocked, funds meant for me eaten on the way. work stopped, result? It made me think of a new safety system fool proof and for all in their hands all well thought out and can be made. No.. no attack can breach those firewalls.
@RC19786
@RC19786 3 месяца назад
frankly speaking, coming from an expericne in cybersec and passion for it, Data Security has to b one of the most boring aspects of it! 🙂
@jeffcrume
@jeffcrume 3 месяца назад
… Yet one of the most critical 😊
Далее
Cybersecurity Architecture: Detection
17:10
Просмотров 34 тыс.
Cybersecurity Architecture: Networks
27:31
Просмотров 92 тыс.
Теперь мы - музыканты!
00:46
Просмотров 60 тыс.
Top 12 Tips For API Security
9:47
Просмотров 68 тыс.
Securing Your IoT Devices
13:55
Просмотров 24 тыс.
The AI Cybersecurity future is here
26:42
Просмотров 148 тыс.
Passwords vs. Passkeys - FIDO Bites Back!
11:05
Просмотров 32 тыс.
Cybersecurity Quiz. How Much Do You Know?
10:57
Просмотров 10 тыс.