Search for tag: "cybersecurity"

Risk-Based Authentication Explained

How do you know who someone really is? It can be hard to tell. How thorough you are might depend on context. That's what risk-based authentication does. In this video Jeff Crume talks about how…

From  chq_master_librarians

Preventing a Global Software Catastrophe

Join Jeff Crume as he discusses methods for preventing software outages on a global scale. He shares lessons learned from recent examples and provides tips for both vendors and users to avoid similar…

From  chq_master_librarians

What is a VPN?

You’ve heard of VPN’s, maybe even used one - but do you know what it is and how it works? In this video, Pooja Devarajan unlocks the secrets of VPN, and explains how Virtual Private…

From  chq_master_librarians

Passwordless Authentication: Weighing the Options

Trying to balance password security vs. convenience? In this video, Jeff Crume explores the evolution of password security and alternatives like biometrics and FIDO.

From  chq_master_librarians

Security vs. Privacy

If you're not paying, you're likely the product. In this video, Jeff Crume explains that statement as well as the impact on user privacy and data security, and how organizations manage…

From  chq_master_librarians

10 Principles for Secure by Design: Baking Security into Your Systems

In this video, cybersecurity expert Jeff Crume explores the 10 principles for secure by design, a best practice approach to building secure systems. Jeff discusses the importance of security by…

From  chq_master_librarians

Anatomy of an AI ATTACK: MITRE ATLAS

Join cybersecurity expert Jeff Crume as he explores the MITRE ATLAS framework, a tool designed to understand and combat AI-based attacks. An evolution of the well-known ATT&CK framework, the…

From  chq_master_librarians

The Cost of a Data Breach

According to IBM's annual Cost of a Data Breach Report, the staggering financial impact of data breaches reached a global average of $4.88 million! Join cybersecurity expert Jeff Crume as he…

From  chq_master_librarians

Scale your tech with a dynamic duo - AI and hybrid cloud

The key to harnessing AI’s full potential is integrating it across all your data – whether on-prem, in the cloud, or at the edge. In this episode, our host Albert Lawrence and guests…

From  chq_master_librarians

Artificial Intelligence: The new attack surface

Artificial intelligence is the hot new thing - and, naturally, it's also a new attack surface for the bad guys. In this video, security expert Jeff Crume explains what kinds of attacks you…

From  chq_master_librarians

IBM Cybersecurity Services integrates with Microsoft Security Technology

Learn how Microsoft Intelligent Security Association (MISA) partner IBM Cybersecurity Services integrates with Microsoft Security Technology.

From  chq_master_librarians

Cyber Attack Trends: Global Identity Crisis

Looking for a way to foresee future attacks and protect your data and your organization from cyber threats? In this video, cybersecurity expert Jeff Crume explains the steps you can take to…

From  chq_master_librarians

Top 5 Cloud Misconfigurations

Cloud misconfigurations are a cause of costly cybersecurity breaches. What can you do to protect your business and IT Infrastructure? Jeff walks through the top five misconfigurations from the…

From  chq_master_librarians

Humans vs. AI. Who's better at Phishing?

Distinguished Engineer, Jeff Crume, walks you through a test that was done to see who was better at Phishing: Humans or AI. The results may surprise you - but either way, with how AI is evolving…

From  chq_master_librarians

How Security Leaders Are Protecting Their Cloud and SaaS Data

Decentralization of data stores is one of the biggest contributors to ‘data chaos’, and it increases attack surfaces, leaving organizations susceptible to expensive data breaches and…

From  chq_master_librarians

How to Secure AI Business Models

Generative AI represents a great opportunity, but it also opens the door to more cyber threats. Privacy and accuracy concerns are among the bigger worries among IT execs. In this video, IBM…

From  chq_master_librarians