|
How do you know who someone really is? It can be hard to tell. How thorough you are might depend on context. That's what risk-based authentication does. In this video Jeff Crume talks about how…
|
|
Join Jeff Crume as he discusses methods for preventing software outages on a global scale. He shares lessons learned from recent examples and provides tips for both vendors and users to avoid similar…
|
|
You’ve heard of VPN’s, maybe even used one - but do you know what it is
and how it works? In this video, Pooja Devarajan unlocks the secrets of
VPN, and explains how Virtual Private…
|
|
Trying to balance password security vs. convenience?
In this video, Jeff Crume explores the evolution of password security and alternatives like biometrics and FIDO.
|
|
If you're not paying, you're likely the product. In this video, Jeff Crume explains that statement as well as the impact on user privacy and data security, and how organizations manage…
|
|
In this video, cybersecurity expert Jeff Crume explores the 10 principles for secure by design, a best practice approach to building secure systems. Jeff discusses the importance of security by…
|
|
Join cybersecurity expert Jeff Crume as he explores the MITRE ATLAS framework, a tool designed to understand and combat AI-based attacks. An evolution of the well-known ATT&CK framework, the…
|
|
According to IBM's annual Cost of a Data Breach Report, the staggering financial impact of data breaches reached a global average of $4.88 million! Join cybersecurity expert Jeff Crume as he…
|
|
The key to harnessing AI’s full potential is integrating it across all your data – whether on-prem, in the cloud, or at the edge. In this episode, our host Albert Lawrence and guests…
|
|
Artificial intelligence is the hot new thing - and, naturally, it's also
a new attack surface for the bad guys. In this video, security expert
Jeff Crume explains what kinds of attacks you…
|
|
Learn how Microsoft Intelligent Security Association (MISA) partner IBM Cybersecurity Services integrates with Microsoft Security Technology.
|
|
Looking for a way to foresee future attacks and protect your data and
your organization from cyber threats? In this video, cybersecurity
expert Jeff Crume explains the steps you can take to…
|
|
Cloud misconfigurations are a cause of costly cybersecurity breaches.
What can you do to protect your business and IT Infrastructure? Jeff
walks through the top five misconfigurations from the…
|
|
Distinguished Engineer, Jeff Crume, walks you through a test that was
done to see who was better at Phishing: Humans or AI. The results may
surprise you - but either way, with how AI is evolving…
|
|
Decentralization of data stores is one of the biggest contributors to ‘data chaos’, and it increases attack surfaces, leaving organizations susceptible to expensive data breaches and…
|
|
Generative AI represents a great opportunity, but it also opens the door to more cyber threats. Privacy and accuracy concerns are among the bigger worries among IT execs. In this video, IBM…
|