Data Security: Protect your critical data (or else)

  Рет қаралды 109,668

IBM Technology

IBM Technology

Күн бұрын

Пікірлер: 30
@belsocial
@belsocial Жыл бұрын
An excellent high-level understanding of data security. You'll simply know where to go and in what order to dig deeper. Thanks!
@jeffcrume
@jeffcrume Жыл бұрын
Thanks so much for all the encouraging words, Elias!
@andalonds
@andalonds 5 ай бұрын
@@jeffcrumeHi I am recent graduate of the University of the West Indies. I am building a website to teach small and medium business all of these things as well as provide services. Can I please use this video for my home page. Thank you kindly. My Name is Odessa Singh.
@NK-iw6rq
@NK-iw6rq Жыл бұрын
Another great video by Jeff and the IBM team !
@RafaelGonzalez-wn3jo
@RafaelGonzalez-wn3jo Жыл бұрын
Excellent as usual!!!!!!
@AjaySingh-ey7gt
@AjaySingh-ey7gt 23 күн бұрын
Excellent explanation ❤
@securetechtalk
@securetechtalk Жыл бұрын
Quality content.👏
@mmava279
@mmava279 Жыл бұрын
amazing video!
@blogcorpo
@blogcorpo Жыл бұрын
Wonderful content! ♥♥
@jeffcrume
@jeffcrume 11 ай бұрын
Thanks!
@Pettynicolla-HD-N.Ayeshamedina
@Pettynicolla-HD-N.Ayeshamedina 2 ай бұрын
Hello #IBM what mean for Dynamic System? Which is included in it?
@LutherDrucker
@LutherDrucker 7 ай бұрын
Data security is very crucial in important point to ponder. And I found this gem Irys which is providing strong data provenance and traceability to origin of data. What are your views on this?
@Moviebear-yh1tm
@Moviebear-yh1tm 6 ай бұрын
It's very interesting 🤔❤️
@veemtg
@veemtg 5 ай бұрын
well explained there!!!
@brickforcezocker01
@brickforcezocker01 Жыл бұрын
Does anybody know how you make a Video like this, where is seems like one is writing on an invisible screen ? :)
@jeffcrume
@jeffcrume Жыл бұрын
I’m working on a behind the scenes video that explains the process so stay tuned …
@Oghene_Million
@Oghene_Million 3 ай бұрын
​@@jeffcrume Hi Jeff, please i need to send you a message,how do i go about it?
@andalonds
@andalonds 5 ай бұрын
hI i WOULD LIKE TO GET PERMISSION TO USE THIS VIDEO ON A WEBSITE PLEASE
@sayarsa
@sayarsa 2 ай бұрын
thanks
@abdalladalle4064
@abdalladalle4064 Жыл бұрын
Where Does DLP fall in here ?
@jeffcrume
@jeffcrume Жыл бұрын
Good question. That was an error on my part to leave it out. You could put it either under Detect or Protect since it has aspects of both
@abdalladalle4064
@abdalladalle4064 Жыл бұрын
@@jeffcrume thanks for your reply.
@ANIIRF
@ANIIRF 4 ай бұрын
protect
@Adam-s8d
@Adam-s8d Ай бұрын
It would fall under detect
@joescoggins5937
@joescoggins5937 Жыл бұрын
I have a box with some wires, a monitor and a router. I don't speak IT. Not a word of it. This video made absolutely no sense to me. I don't know what "Govern" means in terms of my computer, nor "discover." I have a vague idea of what "protect" means, but not what "encript," "key mgmt," "comply," "detect," or "respond" mean in terms of "critical data," whatever than means. Speaking above the heds of the average viewer is not likley to garner you many viewers.
@alexbardelli1
@alexbardelli1 Жыл бұрын
Then you’re in the wrong channel my friend
@philipehusani
@philipehusani Жыл бұрын
LoL... They're not talking to you!
@beng9145
@beng9145 Жыл бұрын
audio bad on this one too
@abdullahimaalim-yi5tl
@abdullahimaalim-yi5tl 7 ай бұрын
wyhat.
Cybersecurity Architecture:  Data Security
14:48
IBM Technology
Рет қаралды 65 М.
Cybersecurity and Zero Trust
17:59
IBM Technology
Рет қаралды 91 М.
She made herself an ear of corn from his marmalade candies🌽🌽🌽
00:38
Valja & Maxim Family
Рет қаралды 18 МЛН
Support each other🤝
00:31
ISSEI / いっせい
Рет қаралды 81 МЛН
How to treat Acne💉
00:31
ISSEI / いっせい
Рет қаралды 108 МЛН
7 Cybersecurity Tips NOBODY Tells You (but are EASY to do)
13:49
All Things Secured
Рет қаралды 1,1 МЛН
AI Trends for 2025
7:32
IBM Technology
Рет қаралды 210 М.
Data Privacy and Consent | Fred Cate | TEDxIndianaUniversity
13:23
DON’T Start Cybersecurity - Do THIS instead
10:33
Tech With Soleyman
Рет қаралды 74 М.
How to set up RAG - Retrieval Augmented Generation (demo)
19:52
Don Woodlock
Рет қаралды 43 М.
Online Privacy & Security 101: How To Actually Protect Yourself?
15:42
Wolfgang's Channel
Рет қаралды 246 М.
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
Ultimate Guide to Data Security for Businesses
9:48
Eye on Tech
Рет қаралды 7 М.
How to Secure AI Business Models
13:13
IBM Technology
Рет қаралды 32 М.
Cybersecurity Trends for 2025 and Beyond
16:55
IBM Technology
Рет қаралды 91 М.