Search for tag: "cyberattack"

The Anatomy of an Att&ck

The bad guys are trying to break into your IT system: They've got tactics, techniques, and procedures (TTPs) they deploy. What about the "good guys" in security? They need a strategy…

From  chq_master_librarians

Designing a Data Protection Solution for Cyber Resilience with a Demonstration - 05242022

To quickly view the demo portion, please click on the upper left hand button within the video (three lines) and click the Demo Chapter, you can quickly jump there. When creating a Cyber…

From  2700070HPT 2700070HPT

DS8K Safeguarded Copy with CSM and GDPS LCP Demo - 05192022

To quickly view the demo portion, please click on the upper left hand button within the video (three lines) and click the Demo Chapter, you can quickly jump there. Protecting your data has…

From  2700070HPT 2700070HPT

Fighting a Cyberattack - IBM Security QRadar XDR Connect (Video 2)

One video in a series of 9 short videos packaged as a Smart Paper on a boutique webpage. See how IBM Security can help.

From  CorpMkt-EiC-JY

Introduction for Maxwell Keyte Interview

A short introduction by Maxwell Keyte, who will invite you to order the book and watch the video.

From  060000DX19 060000DX19

Interview of Marc Elsberg

Interview video with Maxwell Keyte & Dirk Schuite, who interviewed the author of Black Out, Marc Elsberg

From  060000DX19 060000DX19