Cloud Security Risks: Exploring the latest Threat Landscape Report

  Рет қаралды 40,817

IBM Technology

IBM Technology

Күн бұрын

Пікірлер: 53
@Ninj4-b3r
@Ninj4-b3r 2 ай бұрын
Something that wasn’t discussed here was that BEC attacks often use AITM techniques to steal sessions bypassing MFA and how to protect against it
@AlessandroSqueo
@AlessandroSqueo Ай бұрын
How do you project the glass board? That is very interesting. Writing in reverse?
@mneiferbag
@mneiferbag 2 ай бұрын
Hhm, nice video, but it only mentions "cloud" in the first second and in the last seconds. XSS and credentials vulnerabilities are not cloud security risks. You could have these vulnerabilities with a single web server too. With this video title, I would have expected some more cloudy...
@RC19786
@RC19786 15 күн бұрын
its basically an excuse for IBM to "shine" on its X-Force platform, nothing new
@humptyslick
@humptyslick 10 күн бұрын
Gmail is your Google cloud access, some also use it as an alternate verification addy to their device, YT and playstore etc
@nelsonmatembissa5771
@nelsonmatembissa5771 2 ай бұрын
Always glad to see a new upload. Once again a great video! Thanks!
@jeffcrume
@jeffcrume 2 ай бұрын
Thanks so much!
@fransmurati2370
@fransmurati2370 14 күн бұрын
Could a security box between your computer and the web not help to solve these security, it must not be part of your computer, it is a computer by itself, that can use all known security systems to control the threats, it hides your computer identy and only generates an access code before it enters the intended adress, etc.
@jeffcrume
@jeffcrume 7 күн бұрын
What you are describing is similar to SASE. It can address some but not all threats
@tbadi-Tonny
@tbadi-Tonny 3 ай бұрын
Simple and straightforward
@jeffcrume
@jeffcrume 2 ай бұрын
Glad you liked it!
@jervahnmorgan
@jervahnmorgan 2 ай бұрын
Good job, thank you. Please keep the videos coming.
@Seansaighdeoir
@Seansaighdeoir 2 ай бұрын
Nothing about the biggest security risk of all of putting your companies personal data into an entity you are forced to trust and who you have no control over - the big tech cloud drivers like MS Azure, Google, AWS and of course IBM.
@naridabanucio2828
@naridabanucio2828 2 ай бұрын
Excellent lesson, short, comprehensive an clear.
@martinlastname8548
@martinlastname8548 2 ай бұрын
What a great explanation of XSS
@jeffcrume
@jeffcrume 2 ай бұрын
Glad you liked it. I have another video coming up that goes a little deeper into XSS exclusively
@dofilamingo8848
@dofilamingo8848 2 ай бұрын
amazing video as usual
@livinglikeahuman7918
@livinglikeahuman7918 2 ай бұрын
Currently learning cybersec and definitely interested in the cloud and cloud engineering. Wish me luck ive heard its competitive 😅
@AjaySingh-ey7gt
@AjaySingh-ey7gt Ай бұрын
nice video
@harsimarkandhari4045
@harsimarkandhari4045 2 ай бұрын
Thanks a lot, I was just checking out the X Force Cloud Threat Landscape Report and it is great to have such a wonderful explanation for it !!
@jeffcrume
@jeffcrume 2 ай бұрын
I’m glad you liked it!
@tharukapavith8195
@tharukapavith8195 2 ай бұрын
Very informative content!
@gersonbarrientos1580
@gersonbarrientos1580 2 ай бұрын
Very good! I love this video
@carsonjamesiv2512
@carsonjamesiv2512 2 ай бұрын
GOOD EXPLANATION!😃👍🎉
@GeorgeBentes
@GeorgeBentes 2 ай бұрын
Awesome tips! I'll take a look in this passkeys business
@jeffcrume
@jeffcrume 2 ай бұрын
Sure! You might check out the two videos I did on FIDO passkeys here on the IBM Technology channel
@brendawilliams8062
@brendawilliams8062 22 күн бұрын
It appears it’s a job as he said. It doesn’t end
@sk3ffingtonai
@sk3ffingtonai 3 ай бұрын
👍 Thank you for sharing.
@jeffcrume
@jeffcrume 2 ай бұрын
Thanks for watching!
@JikeWimblik
@JikeWimblik 2 ай бұрын
So how do you interpret the bot activity data with good bots like defending connection integrity and bad bots like stealth action bots for ransom ware for example. How could an os use good bot a activity to benefit os security. And less direct security issues with bots for example manipulating audience attraction getting in the way of users reaching better content more suited to what their looking for. It'd be nice to get emailed by a bot if your a system admin if a security flaw has been found. Maybe their should be a communications service for bots that keeps the security bods more informed of the current bot activity climate.
@miguelcano6396
@miguelcano6396 2 ай бұрын
Nice
@BSECAEnerggy
@BSECAEnerggy 2 ай бұрын
Facts!
@BrandonSorenson-fb3gg
@BrandonSorenson-fb3gg 2 ай бұрын
Jerry Bell is also an interesting person to listen to on security
@rmcgraw7943
@rmcgraw7943 2 ай бұрын
Given that the mitigation techniques mentioned here have been around for decades, I would suggests that employee EDUCATION and a policy of least privilege to eliminate 95% of all attack vectors. All of what he discusses here is good, but the 2 above tactics are the 2 biggest ones.
@robertfoertsch
@robertfoertsch 2 ай бұрын
Excellent Analysis, Deployed Worldwide Through My Deep Learning AI Research Library. Thank You ❤
@miraculixxs
@miraculixxs 2 ай бұрын
XSS: if some guy can insert links on your web page you have a lot of problems worse than XSS
@DadtotheMax7
@DadtotheMax7 2 ай бұрын
Exactly! lol
@miraculixxs
@miraculixxs 2 ай бұрын
Source for those 600bn$?
@chancesire
@chancesire 2 ай бұрын
🔥
@Cysecsg
@Cysecsg 2 ай бұрын
These are not cloud-specific risks
@velo1337
@velo1337 2 ай бұрын
dont forget, cross side scripting is not always bad.
@gersonbarrientos1580
@gersonbarrientos1580 2 ай бұрын
Wait what? What do you mean lol
@Thiago1337
@Thiago1337 2 ай бұрын
@@gersonbarrientos1580 I think he means reflected xss without chaining it with other vulnerabilites
@mr.RAND5584
@mr.RAND5584 2 ай бұрын
htmlspecialchars😊
@VictorEstrada
@VictorEstrada 2 ай бұрын
Sorry man, but all you talked about was just email phishing, nothing related to the title.
@oldones59
@oldones59 2 ай бұрын
Stop whining. Look elsewhere and educate yourself.
@rn8923
@rn8923 3 ай бұрын
First
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
10 Principles for Secure by Design: Baking Security into Your Systems
17:28
Une nouvelle voiture pour Noël 🥹
00:28
Nicocapone
Рет қаралды 9 МЛН
BAYGUYSTAN | 1 СЕРИЯ | bayGUYS
36:55
bayGUYS
Рет қаралды 1,9 МЛН
Don’t Choose The Wrong Box 😱
00:41
Topper Guild
Рет қаралды 62 МЛН
Scam Alert: Pig Butchering, Recruitment Scams & More!
20:31
IBM Technology
Рет қаралды 15 М.
Generative AI in a Nutshell - how to survive and thrive in the age of AI
17:57
What is the Dark Web? A Guide to the Dark Side of the Internet
9:49
IBM Technology
Рет қаралды 1,5 МЛН
DO NOT design your network like this!! // FREE CCNA // EP 6
19:36
NetworkChuck
Рет қаралды 3,4 МЛН
Cybersecurity Trends for 2025 and Beyond
16:55
IBM Technology
Рет қаралды 2,4 М.
Cross-Site Scripting: A 25-Year Threat That Is Still Going Strong
9:33
Passwords vs. Passkeys - FIDO Bites Back!
11:05
IBM Technology
Рет қаралды 54 М.
What is a Zero Day Threat?
13:45
IBM Technology
Рет қаралды 19 М.
Cybersecurity Architecture: Who Are You? Identity and Access Management
31:15
Une nouvelle voiture pour Noël 🥹
00:28
Nicocapone
Рет қаралды 9 МЛН