Search for tag: "cybersecurity"

Business Email Compromise (BEC)

Business Email Compromise (BEC) fraud is on the rise. Very similar to phishing attempts, BEC attacks may cause financial and reputational risks depending on how and what the cyber criminals are able…

From  5071K857JF 5071K857JF on June 8th, 2021

Protecting Yourself in Today's Cyber Landscape - Ransomware

This webinar provides an overview of the current threat landscape as it pertains to ransomware, trends, and best practices to help you reduce the risk of falling victim to these types of attacks. It…

From  5071K857JF 5071K857JF on June 8th, 2021

Learn Cybersecurity today with SkillsBuild!

Explore cybersecurity learning and grow your skills with today!

From  5500036VY7 5500036VY7 on June 2nd, 2021

How Open Security Can Make Threat Management More Efficient

Holly Wright discusses how with IBM Cloud Pak for Security you can bring together teams, tools and data with a unified platform that gives analysts a one user experience across threat management.

From  550009VBGX 550009VBGX on May 10th, 2021

Delivering Digital Trust in the Modern Era

Chris Hockings outlines ways to leverage Digital Trust to provide smarter security where some use case scenarios will be highlighted.

From  550009VBGX 550009VBGX on May 10th, 2021

Stealthpath & IBM – Building Innovative Solutions with Watson

Brad O’Dell, Vice President of Business Operations and Sales at Stealthpath, explains how IBM and Stealthpath teamed to solve the security challenges of today using IBM technologies. IBM and…

From  270006MQFJ 270006MQFJ on April 8th, 2021

P-TECH Presents- A Day in the Life of a Cybersecurity & zSystems Professional

In this session, you will learn about the different pathways in cybersecurity and IBM Z Systems and the top technical skills and tips you need to break into the cyberspace.

From  5500036VY7 5500036VY7 on February 22nd, 2021

Artificial Intelligence and Cybersecurity

What benefits does artificial intelligence (AI) present for cybersecurity? AI's capability to analyze massive quantities of data with lightning speed means security threats can be detected in…

From  chq_mkt_delegated on January 22nd, 2021

Webinar: Cómo prepararse para la recuperación tras un ciberataque

Vivimos un escenario cambiante en torno al uso de la tecnología en el negocio y a la probabilidad e impactos de los riesgos, con una aparición con muchísimo mayor protagonismo de…

From  3100028KV4 3100028KV4 on January 12th, 2021

Detrás del escudo de IBM

Cómo el equipo de IBM seguridad ayuda a las organizaciones a alinear, proteger, gestionar y modernizar sus programas de seguridad con las soluciones basadas en Inteligencia…

From  CHQMKT_Europe on December 3rd, 2020

IBM Shield

W jaki sposób IBM Security pomaga organizacjom w dostosowywaniu, ochronie, zarządzaniu i modernizowaniu ich programów bezpieczeństwa za pomocą najbardziej…

From  CHQMKT_Europe on November 27th, 2020

Hinter dem IBM Schild

Wie IBM Security Unternehmen dabei unterstützt, ihre Sicherheitsprogramme mit den fortschrittlichsten KI-gesteuerten Lösungen auf den neuesten Stand zu bringen, um gegen…

From  CHQMKT_Europe on November 27th, 2020

Security everywhere: Taking on the new cyber risk landscape

It is indisputable that the 2020 has tested vulnerabilities in security. More remote work means more unsecured network access points and cybercriminals are taking advantage of it. Reports of phishing…

From  CHQMKT_NA on November 24th, 2020

Под защитой IBM Shield

Как решения IBM для безопасности помогают компаниям согласовывать, реализовывать, администрировать и модернизировать программы обеспечения безопасности с помощью ультрасовременных…

From  CHQMKT_Europe on November 18th, 2020

Derrière l'IBM Shield

La sécurité IBM aide les entreprises à aligner, protéger, gérer et moderniser leurs programmes de sécurité, grâce à…

From  CHQMKT_Europe on November 13th, 2020