Cybersecurity Architecture: Endpoints Are the IT Front Door - Guard Them

  Рет қаралды 46,585

IBM Technology

IBM Technology

Күн бұрын

IBM Security QRadar EDR : ibm.biz/BdySEq
IBM Security X-Force Threat Intelligence Index 2023: ibm.biz/BdySEf
The prior video in the series covered identity and access management (IAM), which Jeff "the security guy" described as the new perimeter. Of course, none of those access precautions, like multi-factor authentication, will matter if you can't trust the platform that it's coming from. In this video, Jeff Crume explains how to assure that endpoints are in fact secure and can be trusted.
Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #endpointsecurity

Пікірлер: 38
@chanyuan-cv4op
@chanyuan-cv4op 10 ай бұрын
This is my favorite teacher.🧑‍🏫❤
@jeffcrume
@jeffcrume 10 ай бұрын
Thank you! Very nice of you to say so!
@appleman9236
@appleman9236 12 күн бұрын
This series single handedly resparked my interest in cybersecurity. Thank you
@NambiarRam
@NambiarRam 4 ай бұрын
All 10 Videos are very educative and provide greater insight into Cybersecurity framework, domains and over all detection and response strategy. Thanks Professor
@jeffcrume
@jeffcrume 3 ай бұрын
Thanks so much for watching and commenting!
@Vagabond_Shinobi
@Vagabond_Shinobi 11 күн бұрын
Woah when he said subscribe the subscribe button did a cool animation i never seen that on KZbin lol i must be in fullscreen too often
@707neon
@707neon 10 ай бұрын
This series is Amazing!!!
@jeffcrume
@jeffcrume 10 ай бұрын
Thanks for saying so @707neon!
@mrb180
@mrb180 7 ай бұрын
A good weak endpoint security analogy would be alike to a submarine doing its job, looking above the waters through its periscope trying to stalk and remain unnoticed, while behind it there's a undetected enemy sub.
@mthoko
@mthoko 10 ай бұрын
You’re a brilliant educator
@jeffcrume
@jeffcrume 10 ай бұрын
@mthoko you are far too kind but thank you for saying so!
@shubhdey553
@shubhdey553 9 ай бұрын
Hi Professor - The videos you post on Cybersecurity are great and pretty concise yet provides a holistic view. Could you also make videos on IT audit and steps to perform them
@jeffcrume
@jeffcrume 9 ай бұрын
Thanks for the suggestion! Unfortunately, I don’t have a background in audit so I’m afraid I wouldn’t do the topic justice
@rodgoldsmith9452
@rodgoldsmith9452 10 ай бұрын
Good stuff. Been taking notes and replaying episodes back to back.
@jeffcrume
@jeffcrume 10 ай бұрын
I love to hear this!
@Douglas_Gillette
@Douglas_Gillette 10 ай бұрын
This is a great video. It reminds me of something that Snowden revealed: the NSA is not too bothered by encryption because most devices have weak endpoint security. That means they can easily intercept your phone, laptop, or smart TV traffic and access your data via local methods, such as your device’s operating system or hardware. Encryption is one of the best ways to protect your privacy online, but it’s not enough if your device is vulnerable.
@velo1337
@velo1337 10 ай бұрын
that was years ago when he actually worked in the field. now we got hardwarelevel encryption build in nearly everywhere
@jeffcrume
@jeffcrume 10 ай бұрын
Excellent point. Security, like a chain, is only as strong as its weakest link
@jeffcrume
@jeffcrume 10 ай бұрын
@@velo1337hat’s a definitely improvement but, still, if the endpoint has been jailbroken or has a weak (or no) password, etc., it can be breached
@Pem7
@Pem7 2 ай бұрын
Designing and building systems with security in mind is a defense not so stressed enough 🤞.
@jeffcrume
@jeffcrume Ай бұрын
Very true
@aruizsilva
@aruizsilva 5 ай бұрын
Such a wonderful explanation. Thank you very much!
@jeffcrume
@jeffcrume 3 ай бұрын
Thanks for saying so!
@dragonsniper503
@dragonsniper503 Ай бұрын
Great instructor thank you
@jeffcrume
@jeffcrume Ай бұрын
Thanks so much for saying so!
@broakwasi8209
@broakwasi8209 10 ай бұрын
Salute sir
@venkat270484
@venkat270484 8 ай бұрын
Hey Professor, I was just try first cybersecurity video for testing, It is very interesting session and very clean, very excellent explanation. Thank you so much IBM and Team. 💌🥰🥰🥰🥰🥰🥰🍺🍺🍺
@jeffcrume
@jeffcrume 8 ай бұрын
You’re very welcome @venkat270484!
@mauriciosouzarodriguesdacu5516
@mauriciosouzarodriguesdacu5516 10 ай бұрын
Very good
@soh3il9
@soh3il9 5 ай бұрын
Your sound so much like Steve Jobs, and you explain really well
@jeffcrume
@jeffcrume 5 ай бұрын
That’s really high praise as Steve was such an amazing communicator. Only in my dreams could I approach his level. Thanks for the compliment!
@emc3000
@emc3000 8 ай бұрын
Maybe a silly question, but would QR codes be considered an attack surface? I see QR codes linked to online menus and instruction manuals for products as a very dangerous attack vector similar to juice jacking.
@jeffcrume
@jeffcrume 8 ай бұрын
@emc3000 for sure. Maybe a good topic for a future video…
@emc3000
@emc3000 8 ай бұрын
@jeffcrume Thanks! I actually have a lot of thoughts/ideas about socially engineered attack vectors, but as I am not criminally oriented, not sure who will employ me to consult about this 😅🤣
@Runclimblift
@Runclimblift 2 ай бұрын
Something that has confused me in this space, 'monitor usage' this sounds more like you're monitoring time consumption rather than what you're consuming. Or is that just me from an MSP Billing space
@jeffcrume
@jeffcrume 2 ай бұрын
Since I’m focused on the security context, I’m more interested in monitoring for abnormal events
@rametelalema3811
@rametelalema3811 6 ай бұрын
Hi professor please I biginner the ICT so need special assistance help me. ❤
@gmanonDominicana
@gmanonDominicana 10 ай бұрын
Plenty of common sense.
Cybersecurity Architecture: Networks
27:31
IBM Technology
Рет қаралды 86 М.
Зу-зу Күлпәш.Курс (6 бөлім)
40:48
ASTANATV Movie
Рет қаралды 521 М.
Glow Stick Secret 😱 #shorts
00:37
Mr DegrEE
Рет қаралды 128 МЛН
Когда на улице Маябрь 😈 #марьяна #шортс
00:17
Agon Light 2 - Secret Program to create Abstract Art!
13:48
The AI Cybersecurity future is here
26:42
David Bombal
Рет қаралды 145 М.
Master Data Management (MDM) - Chalk and Talk
19:01
Dave Does Demos
Рет қаралды 19 М.
Passwords vs. Passkeys - FIDO Bites Back!
11:05
IBM Technology
Рет қаралды 30 М.
Cybersecurity Architecture: Application Security
16:36
IBM Technology
Рет қаралды 46 М.
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
Data Scientist vs. AI Engineer
10:39
IBM Technology
Рет қаралды 47 М.
FIDO Promises a Life Without Passwords
9:58
IBM Technology
Рет қаралды 388 М.
Зу-зу Күлпәш.Курс (6 бөлім)
40:48
ASTANATV Movie
Рет қаралды 521 М.