Something that wasn’t discussed here was that BEC attacks often use AITM techniques to steal sessions bypassing MFA and how to protect against it
@AlessandroSqueoАй бұрын
How do you project the glass board? That is very interesting. Writing in reverse?
@mneiferbag2 ай бұрын
Hhm, nice video, but it only mentions "cloud" in the first second and in the last seconds. XSS and credentials vulnerabilities are not cloud security risks. You could have these vulnerabilities with a single web server too. With this video title, I would have expected some more cloudy...
@RC1978615 күн бұрын
its basically an excuse for IBM to "shine" on its X-Force platform, nothing new
@humptyslick10 күн бұрын
Gmail is your Google cloud access, some also use it as an alternate verification addy to their device, YT and playstore etc
@nelsonmatembissa57712 ай бұрын
Always glad to see a new upload. Once again a great video! Thanks!
@jeffcrume2 ай бұрын
Thanks so much!
@fransmurati237014 күн бұрын
Could a security box between your computer and the web not help to solve these security, it must not be part of your computer, it is a computer by itself, that can use all known security systems to control the threats, it hides your computer identy and only generates an access code before it enters the intended adress, etc.
@jeffcrume7 күн бұрын
What you are describing is similar to SASE. It can address some but not all threats
@tbadi-Tonny3 ай бұрын
Simple and straightforward
@jeffcrume2 ай бұрын
Glad you liked it!
@jervahnmorgan2 ай бұрын
Good job, thank you. Please keep the videos coming.
@Seansaighdeoir2 ай бұрын
Nothing about the biggest security risk of all of putting your companies personal data into an entity you are forced to trust and who you have no control over - the big tech cloud drivers like MS Azure, Google, AWS and of course IBM.
@naridabanucio28282 ай бұрын
Excellent lesson, short, comprehensive an clear.
@martinlastname85482 ай бұрын
What a great explanation of XSS
@jeffcrume2 ай бұрын
Glad you liked it. I have another video coming up that goes a little deeper into XSS exclusively
@dofilamingo88482 ай бұрын
amazing video as usual
@livinglikeahuman79182 ай бұрын
Currently learning cybersec and definitely interested in the cloud and cloud engineering. Wish me luck ive heard its competitive 😅
@AjaySingh-ey7gtАй бұрын
nice video
@harsimarkandhari40452 ай бұрын
Thanks a lot, I was just checking out the X Force Cloud Threat Landscape Report and it is great to have such a wonderful explanation for it !!
@jeffcrume2 ай бұрын
I’m glad you liked it!
@tharukapavith81952 ай бұрын
Very informative content!
@gersonbarrientos15802 ай бұрын
Very good! I love this video
@carsonjamesiv25122 ай бұрын
GOOD EXPLANATION!😃👍🎉
@GeorgeBentes2 ай бұрын
Awesome tips! I'll take a look in this passkeys business
@jeffcrume2 ай бұрын
Sure! You might check out the two videos I did on FIDO passkeys here on the IBM Technology channel
@brendawilliams806222 күн бұрын
It appears it’s a job as he said. It doesn’t end
@sk3ffingtonai3 ай бұрын
👍 Thank you for sharing.
@jeffcrume2 ай бұрын
Thanks for watching!
@JikeWimblik2 ай бұрын
So how do you interpret the bot activity data with good bots like defending connection integrity and bad bots like stealth action bots for ransom ware for example. How could an os use good bot a activity to benefit os security. And less direct security issues with bots for example manipulating audience attraction getting in the way of users reaching better content more suited to what their looking for. It'd be nice to get emailed by a bot if your a system admin if a security flaw has been found. Maybe their should be a communications service for bots that keeps the security bods more informed of the current bot activity climate.
@miguelcano63962 ай бұрын
Nice
@BSECAEnerggy2 ай бұрын
Facts!
@BrandonSorenson-fb3gg2 ай бұрын
Jerry Bell is also an interesting person to listen to on security
@rmcgraw79432 ай бұрын
Given that the mitigation techniques mentioned here have been around for decades, I would suggests that employee EDUCATION and a policy of least privilege to eliminate 95% of all attack vectors. All of what he discusses here is good, but the 2 above tactics are the 2 biggest ones.
@robertfoertsch2 ай бұрын
Excellent Analysis, Deployed Worldwide Through My Deep Learning AI Research Library. Thank You ❤
@miraculixxs2 ай бұрын
XSS: if some guy can insert links on your web page you have a lot of problems worse than XSS
@DadtotheMax72 ай бұрын
Exactly! lol
@miraculixxs2 ай бұрын
Source for those 600bn$?
@chancesire2 ай бұрын
🔥
@Cysecsg2 ай бұрын
These are not cloud-specific risks
@velo13372 ай бұрын
dont forget, cross side scripting is not always bad.
@gersonbarrientos15802 ай бұрын
Wait what? What do you mean lol
@Thiago13372 ай бұрын
@@gersonbarrientos1580 I think he means reflected xss without chaining it with other vulnerabilites
@mr.RAND55842 ай бұрын
htmlspecialchars😊
@VictorEstrada2 ай бұрын
Sorry man, but all you talked about was just email phishing, nothing related to the title.
@oldones592 ай бұрын
Stop whining. Look elsewhere and educate yourself.