Search for tag: "cybersecurity"
How AI can accelerate cybersecurityIn this episode of Smart Talks with IBM, Malcolm Gladwell speaks with Jason Kelley, GM, Strategic Partners and Ecosystems at IBM, and Kristy Friedrichs, SVP and Chief Partnership Officer at Palo Alto… |
|
Securing operational technology with IBM Cybersecurity ServicesDigital transformation connects operational technology like never before. That connectivity makes industrial organizations smarter and safer, gives them better management and visibility, and improves… |
|
Tips on AI for career in CybersecurityHear from Jeff Crume, an IBMer with over 40 years of experience who also teaches Cybersecurity at North Carolina State University, as he shares tips on how AI can help you kickstart a career in… |
|
Enhance product and brand value through cybersecurityHow can automotive companies with a wealth of data enhance product and brand value through cybersecurity? Hear from Nicole Roik, Head of Technology for Security, Global Manufacturing, IBM to learn… |
|
What is Cyber Resilience?In today's world, cyber attacks are inevitable. Learn how to quickly recover with a robust cyber resiliency plan. In this video, Grant Harris explains the 5 steps you need to reduce recovery… |
|
Unlocking the Future of Transportation: The Intersection of AI, Cyber Security, and Connected CarsCome on a journey to explore the exciting intersection of artificial intelligence, cyber security, and connected cars. In this video, Martin Keen & Jeff Crume delve into the latest trends,… |
|
Cloud Security Risks: Exploring the latest Threat Landscape ReportThe cloud is a prime target for cyber attacks, but there are steps you can take to protect your organization. Join cybersecurity expert Jeff Crume as he discusses the latest cloud security threats… |
|
Risk-Based Authentication ExplainedHow do you know who someone really is? It can be hard to tell. How thorough you are might depend on context. That's what risk-based authentication does. In this video Jeff Crume talks about how… |
|
Preventing a Global Software CatastropheJoin Jeff Crume as he discusses methods for preventing software outages on a global scale. He shares lessons learned from recent examples and provides tips for both vendors and users to avoid similar… |
|
What is a VPN?You’ve heard of VPN’s, maybe even used one - but do you know what it is and how it works? In this video, Pooja Devarajan unlocks the secrets of VPN, and explains how Virtual Private… |
|
Passwordless Authentication: Weighing the OptionsTrying to balance password security vs. convenience? In this video, Jeff Crume explores the evolution of password security and alternatives like biometrics and FIDO. |
|
Security vs. PrivacyIf you're not paying, you're likely the product. In this video, Jeff Crume explains that statement as well as the impact on user privacy and data security, and how organizations manage… |
|
10 Principles for Secure by Design: Baking Security into Your SystemsIn this video, cybersecurity expert Jeff Crume explores the 10 principles for secure by design, a best practice approach to building secure systems. Jeff discusses the importance of security by… |
|
Anatomy of an AI ATTACK: MITRE ATLASJoin cybersecurity expert Jeff Crume as he explores the MITRE ATLAS framework, a tool designed to understand and combat AI-based attacks. An evolution of the well-known ATT&CK framework, the… |
|
The Cost of a Data BreachAccording to IBM's annual Cost of a Data Breach Report, the staggering financial impact of data breaches reached a global average of $4.88 million! Join cybersecurity expert Jeff Crume as he… |
|
Scale your tech with a dynamic duo - AI and hybrid cloudThe key to harnessing AI’s full potential is integrating it across all your data – whether on-prem, in the cloud, or at the edge. In this episode, our host Albert Lawrence and guests… |