Search for tag: "cybersecurity"

Los Angeles Cyber Lab

The city of Los Angeles is helping citizens and small and medium businesses defend themselves against cyberattacks. Government is challenged with keeping residents safe. LA Cyber Lab is a…

From  5500021X6T 5500021X6T on June 26th, 2020 25 plays

Drive security into the fabric of your business by investing in your people

A conversation between Wendi Whitmore, VP IBM Security X-Force and Roland Cloutier, CSO, ADP about driving security into the fabric of business, and building security leadership and culture.

From  5500021X6T 5500021X6T on February 28th, 2020 261 plays

Business Continuity Manager: ensure continuous availability of IT infrastructure_EN

Find out how a BCM program can help reduce risks, and costs.

From  310001BB3W 310001BB3W on November 8th, 2019 4 plays

Entenda o custo e a prevenção da violação de dados

Nesse vídeo, Felipe Prado aborda pautas sobre a violação e prevenção de dados. Desse modo, é importante ressaltar o volume médio global de vazamento…

From  50QHPYU842 50QHPYU842 on September 5th, 2019 16 plays

Why you need an automated approach to IT GRC management

In many companies different departments have their own IT systems and processes to manage governance, risk and compliance (GRC). These disparate management programs are not sufficient to provide the…

From  55000109FR 55000109FR on July 17th, 2019 35 plays

Making Money MuVs by Detecting and Stopping Advanced Threats

Advanced threats can do more than stop business in its tracks, they can also ground a product launch before lift-off. See how MuVMitt used a combination of today’s cybersecurity tools and…

From  55000109FR 55000109FR on July 16th, 2019 2 plays

10 puntos clave para una estrategia de ciberseguridad - Cloud en 30

Descubre los puntos que necesariamente debe de tomar en cuenta cualquier empresa para estar protegido! Acompáñanos a verlo con nuestro especialista en seguridad.

From  5500002G4Q 5500002G4Q on June 3rd, 2019 48 plays

Interns: A Goldmine for Hackers & Social Engineering

While internships are a great way to get a "foot in the door" at a company, these interns' social media habits could be helping hackers get a foot in the door as well through…

From  5500021X6T 5500021X6T on May 24th, 2019 49 plays

Estado actual de las amenazas de seguridad - Cloud en 30

Hoy existen 140,000 tipos de vulnerabilidades en la red y el ciberataque es el 5to elemento de mayor riesgo para los negocios con enorme impacto económico. Conoce más con nuestro…

From  5500002G4Q 5500002G4Q on April 24th, 2019 47 plays

IBM Security -- Protecting the Faces Behind the Data

It is not just data that needs to be protected. People are the data.

From  50QHPYU842 50QHPYU842 on January 25th, 2019 29 plays

DB Systel: Leveraging Blockchain to create a seamless transportation experience

DB Systel, in the pursuit of enhancing user experience and bridging gaps in mobility services, synergized with IBM to create a Blockchain platform. This platform provides a seamless experience for…

From  270006MQHP 270006MQHP on September 4th, 2018 1,530 plays

Banco Santander Mexico: Embracing Cybersecurity to stay a step ahead of fraudsters

Banco Santander Mexico deploys a state-of-the-art security tool using IBM Trusteer solutions to quickly identify and stop fraudulent logins and transactions, without interfering unnecessarily with…

From  270006MQHP 270006MQHP on September 3rd, 2018 929 plays

Secure-24, LLC partners with IBM to help protect against today’s cyber threats

To provide comprehensive and effective incident management support, Secure-24, LLC takes advantage of its position as an IBM Business Partner to access advanced technical resources and comprehensive…

From  270006MQHP 270006MQHP on May 16th, 2018 16 plays