Cybersecurity Architecture: Data Security

  Рет қаралды 71,602

IBM Technology

IBM Technology

Күн бұрын

Пікірлер: 34
@kemsthegreat
@kemsthegreat Жыл бұрын
Jeff proves his Ph.D. well. He explained these topics in a way everyone can understand. Not dumbed down.
@jeffcrume
@jeffcrume Жыл бұрын
Thank you for the kind words!
@atocampoari8575
@atocampoari8575 Жыл бұрын
Ever since i took a course on cybersecurity by IBM...your ability to simplify complex and lengthy content is so smooth and easy to grasp....you are now my favourite teacher😎🔥
@jeffcrume
@jeffcrume Жыл бұрын
Very nice of you to say so! I’m really glad you are enjoying the videos!
@billyfoster3223
@billyfoster3223 Жыл бұрын
Great video series! This is helping me with my cybersecurity studies! Thanks!😁👍
@jeffcrume
@jeffcrume Жыл бұрын
As a teacher, I love hearing this!
@kent_calvin
@kent_calvin Жыл бұрын
My favourite teacher is back 🎉
@jeffcrume
@jeffcrume Жыл бұрын
Thanks so much for the kind words! 😊
@hunter5701
@hunter5701 9 ай бұрын
Love this whole series. I'm a senior consultant at a major cybersecurity company and this has given me a knowledge roadmap. Thank you so much.
@jeffcrume
@jeffcrume 9 ай бұрын
You’re very welcome!
@materubass
@materubass Жыл бұрын
Awesome video. When it comes to data protection one topic that is sometimes overlooked is encryption for data-in-use. There are technologies such as Redis that tend to put data in-memory (a place that is not always encrypted by default) which could be subject to memory dumps where sensitive data as well as encryption keys could be extracted from. Thankfully Intel and AMD have improved memory protection (TME and SME) in their latest processors families enabling encryption for data-in-use.
@adeleyejaphet8334
@adeleyejaphet8334 5 ай бұрын
Very much love to learn
@tomahs9823
@tomahs9823 Жыл бұрын
Great Video!
@rafaelkss2009
@rafaelkss2009 Жыл бұрын
great series
@naridabanucio2828
@naridabanucio2828 5 ай бұрын
I would suggest to create a similar series for Security Risk Governance and Management.
@pankaj16octdogra
@pankaj16octdogra Жыл бұрын
Nice presentation
@gavbam
@gavbam Жыл бұрын
Kudos to the instructor, now only was the content engaging but kept to the content without going down the path of blowing his own trumpet on every topic. Thank you for the clear and concise information.
@jeffcrume
@jeffcrume Жыл бұрын
Thank you for the kind complements!
@srivasala4080
@srivasala4080 Жыл бұрын
Super👌
@LutherDrucker
@LutherDrucker 8 ай бұрын
Love to learn these kind of architecture!! Also just got to know about a Irys which is world only provenance layer that is making buzz all around do you know about it !!
@jeffcrume
@jeffcrume 7 ай бұрын
Glad you liked it!
@ralphdebruijn9082
@ralphdebruijn9082 8 күн бұрын
So how do we use the chatbot but still keep our code safe?
@Jerrauex
@Jerrauex Жыл бұрын
10:00 🗃️📚📝
@WilhelmPendragon
@WilhelmPendragon 11 ай бұрын
So if your company’s total value is below 4.35M, a data breach has already eliminated your company?
@jeffcrume
@jeffcrume 10 ай бұрын
Not likely. That’s the AVERAGE cost for ALL companies. Your situation can always vary
@Companyellivera
@Companyellivera 3 күн бұрын
Hello sirsorry last night
@Companyellivera
@Companyellivera 8 күн бұрын
i folllowed ung diccuss and study it that s why i put in data base hheeh
@RC19786
@RC19786 11 ай бұрын
frankly speaking, coming from an expericne in cybersec and passion for it, Data Security has to b one of the most boring aspects of it! 🙂
@jeffcrume
@jeffcrume 11 ай бұрын
… Yet one of the most critical 😊
@MalvinderKaur-e7x
@MalvinderKaur-e7x 8 ай бұрын
Everything fails before the first line of security which should come with all electronic tech gadgets and servers, now what are those? How should it be made that hackers even if they chew their hair to the end cannot, it is in the coding programming language creating firewalls and..... No. I am not telling till I do not get a good with my integrity partner... Hackers already have broken into set firewalls sold outside by buying them and hacking them, so are useless since ages,I have been so hassled in this arena my online life is blocked, funds meant for me eaten on the way. work stopped, result? It made me think of a new safety system fool proof and for all in their hands all well thought out and can be made. No.. no attack can breach those firewalls.
@karashevf
@karashevf 6 ай бұрын
1K
@karashevf
@karashevf 6 ай бұрын
447
@avataros111
@avataros111 15 күн бұрын
IBM finger pointing
@OmarAbdelrahman-i5r
@OmarAbdelrahman-i5r 18 күн бұрын
man...I kinda got used to your filtered voice in previous video
Cybersecurity Architecture: Detection
17:10
IBM Technology
Рет қаралды 60 М.
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
Enceinte et en Bazard: Les Chroniques du Nettoyage ! 🚽✨
00:21
Two More French
Рет қаралды 42 МЛН
小丑女COCO的审判。#天使 #小丑 #超人不会飞
00:53
超人不会飞
Рет қаралды 16 МЛН
小丑教训坏蛋 #小丑 #天使 #shorts
00:49
好人小丑
Рет қаралды 54 МЛН
The AI Cybersecurity future is here
26:42
David Bombal
Рет қаралды 170 М.
Cybersecurity Architecture: Who Are You? Identity and Access Management
31:15
Cybersecurity Architecture: Networks
27:31
IBM Technology
Рет қаралды 195 М.
Cybersecurity Trends for 2025 and Beyond
16:55
IBM Technology
Рет қаралды 245 М.
Cybersecurity Architecture: Application Security
16:36
IBM Technology
Рет қаралды 93 М.
What Is Security Architecture?
15:41
Hacker Valley Media
Рет қаралды 2,3 М.
Why We Shouldn't Underestimate This Spy Network
26:31
Johnny Harris
Рет қаралды 3,8 МЛН
Ultimate Guide to Data Security for Businesses
9:48
Eye on Tech
Рет қаралды 7 М.
Enceinte et en Bazard: Les Chroniques du Nettoyage ! 🚽✨
00:21
Two More French
Рет қаралды 42 МЛН