Security vs. Privacy

  Рет қаралды 7,446

IBM Technology

IBM Technology

Күн бұрын

Read the Cost of a Data Breach report → ibm.biz/BdK4GL
Learn more about the security with IBM → ibm.biz/BdK4G9
If you're not paying, you're likely the product. In this video, Jeff Crume explains that statement as well as the impact on user privacy and data security, and how organizations manage these concerns. Discover the importance of informed consent, transparency, and regulatory compliance in safeguarding personal information - and the critical distinctions, and relationship, between security and privacy in digital services.
Sign up for a monthly newsletter: Security updates from IBM → ibm.biz/BdK4GC

Пікірлер: 23
@RainMan52
@RainMan52 Ай бұрын
Even when you pay full price for it, you're the product.
@jeffcrume
@jeffcrume Ай бұрын
Certainly that is a possibility but not every company operates that way
@narcisopena5251
@narcisopena5251 Ай бұрын
Great explanation! Thanks Jeff.
@mullla1ya
@mullla1ya Ай бұрын
You got me thinking about work, wage, taxes, and who pays whom. Am I a product at my work and a customer in the state? 🤔
@jeffcrume
@jeffcrume Ай бұрын
Good questions!
@VuDucThuan-iy2mk
@VuDucThuan-iy2mk 11 күн бұрын
Thank you for sharing.
@ettoreatalan8303
@ettoreatalan8303 Ай бұрын
<a href="#" class="seekto" data-time="325">5:25</a> GDPR is the acronym for “*General* Data Protection Regulation”.
@CountdownIdiomas
@CountdownIdiomas Ай бұрын
I liked a lot the board you wrote to explain. Is it IBM tech board to provide classes?
@jeffcrume
@jeffcrume Ай бұрын
Glad you liked it. Yes, we have lots of light board videos on the IBM Technology channel. If you want to know how we make these, search for “how we make them” on this channel
@GrayCatPI
@GrayCatPI Ай бұрын
Great insights on the balance between security and privacy. How can organizations better educate their users about informed consent and the importance of data security?
@jeffcrume
@jeffcrume Ай бұрын
Glad you liked it. I teach a course at the university level that deals with these issues. Not always simple or straightforward but making people aware of what can and is being done with their data is a start
@GrayCatPI
@GrayCatPI Ай бұрын
@@jeffcrume Is it available for the public?
@0xdolan
@0xdolan Ай бұрын
🔥
@dofilamingo8848
@dofilamingo8848 Ай бұрын
I like your videos a lot
@jeffcrume
@jeffcrume Ай бұрын
Thanks so much!
@ravbhuva
@ravbhuva Ай бұрын
I believe "ISO 27000/ISO 27001" Security Side right?
@jeffcrume
@jeffcrume Ай бұрын
Yes, privacy is addressed by other standards
@carsonjamesiv2512
@carsonjamesiv2512 Ай бұрын
😃👍
@chancymzama7478
@chancymzama7478 Ай бұрын
nice
@randompurposepurpose3047
@randompurposepurpose3047 Ай бұрын
Do something about ai taking the jobs
@TOMESHTI
@TOMESHTI Ай бұрын
Study
What is a Zero Day Threat?
13:45
IBM Technology
Рет қаралды 13 М.
Cybersecurity Architecture: Who Are You? Identity and Access Management
31:15
Survive 100 Days In Nuclear Bunker, Win $500,000
32:21
MrBeast
Рет қаралды 163 МЛН
لااا! هذه البرتقالة مزعجة جدًا #قصير
00:15
One More Arabic
Рет қаралды 52 МЛН
7 Days Stranded In A Cave
17:59
MrBeast
Рет қаралды 87 МЛН
iPhone Mistakes That RUIN Your Privacy
10:57
All Things Secured
Рет қаралды 30 М.
We Need to Rethink Exercise - The Workout Paradox
12:00
Kurzgesagt – In a Nutshell
Рет қаралды 7 МЛН
Passwords vs. Passkeys - FIDO Bites Back!
11:05
IBM Technology
Рет қаралды 40 М.
What Is an AI Anyway? | Mustafa Suleyman | TED
22:02
TED
Рет қаралды 1,4 МЛН
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
Will AI Help or Hurt Cybersecurity? Definitely!
10:01
IBM Technology
Рет қаралды 29 М.
What is an API Gateway?
10:19
IBM Technology
Рет қаралды 305 М.
Apple’s Craig Federighi Explains New iPhone Security Features | WSJ
6:26
The Wall Street Journal
Рет қаралды 320 М.