Тёмный
No video :(

User Behavior Analytics 

IBM Technology
Подписаться 831 тыс.
Просмотров 13 тыс.
50% 1

UEBA: User and Entity Behavior Analytics: ibm.biz/User_B...
Security starts with your organization, but what if your company has 100, 1000, or even 100,000 users? Identifying suspicious user activity simply can’t be done manually; you need a strategy for finding the “bad guys” who may be undermining your organization from within. In this video, Jeff “The Security Guy” explains how analyzing user (and entity) behaviors with UBA/UEBA tools can help cut through the haze and identify potential threats to your IT security.
Get started for free on IBM Cloud → ibm.biz/ibm-cl...
Subscribe to see more videos like this in the future → ibm.biz/subscri...
#AI #Software #Dev #lightboard #IBM #UEBA

Опубликовано:

 

26 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 12   
@FreshWillBoy302
@FreshWillBoy302 Год назад
This presentation was explained extremely well. Thank you!!!
@Untap101
@Untap101 Год назад
I come from an ABA background, and a career in IT. This is the most fascinating thing I’ve heard in a long time. I want more content of this.
@jeffcrume
@jeffcrume Год назад
Thanks for the great feedback, Untap101! Here’s a playlist with all my videos: ru-vid.com/group/PLdw2bVqUvsk2PnreCdr5uDZ1CjwvQScKe
@madebydade305ify
@madebydade305ify 11 месяцев назад
I'm also in the ABA world looking to get into IT.
@ServaneTellouck
@ServaneTellouck Год назад
Great video, great content !
@atanjacket
@atanjacket Год назад
I feel like you could make a comedy sketch from this: User downloads large log data history to make ML model => User trains new model from accessed data => User goes to upgrade algorithm by loading more data into model => Model notices user accessing more data than normal => User gets fired due to heightened security risk => Model never upgraded again.
@BeSwee
@BeSwee Год назад
Insightful
@litttlemooncream5049
@litttlemooncream5049 Год назад
thanks! helped
@leowhogoestothedojo8523
@leowhogoestothedojo8523 Год назад
So, create decoy anomalies and get all that has to be done from entities which can function around those anomalies, so the attention will never be drawn to them. And everything appears to fit within the square box.
@tyrojames9937
@tyrojames9937 Год назад
YOU GOT ME!
@rb-os4cm
@rb-os4cm Год назад
I think you shouldn't mention "rules" and "machine learning" together. then its not really machine learning, its the traditional rule based system.
@Morcap
@Morcap 11 месяцев назад
Although you are correct from a Business Intelligence point of view, technically speaking there is still an initial core set of rules that defines the routine for the clustering of pathways - patterning and especially depatterning (spotting anomalies) -, soo the presenter is not entirely wrong (maybe he should've define what he meant by ''rules'').
Далее
microsoft doubles down on recording your screen
10:00
skibidi toilet multiverse 041
06:01
Просмотров 5 млн
Social Engineering - How Bad Guys Hack Users
14:58
Просмотров 50 тыс.
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
What is the LLM's Context Window ?
7:26
Просмотров 512
What are AI Agents?
12:29
Просмотров 209 тыс.
Understanding Hackers
10:41
Просмотров 31 тыс.
Why "pop-up" restaurants are everywhere now
6:05
Просмотров 714 тыс.
Don't Use ChatGPT Until You Watch This Video
13:40
Просмотров 1,6 млн
Why Europe’s Economy is Doing Better than You Think
8:19
What Is a Prompt Injection Attack?
10:57
Просмотров 195 тыс.