Search for tag: "security"

Hacking Generative AI: Limiting security risk in the age of AI

While 81% of executives stress the importance of secure and trustworthy AI, only 24% of AI projects are secure. Is it ever ok to prioritize innovation over security when it comes to AI? Listen to…

+15 More
From  chq_master_librarians

Security filters in data modules

In this video we will augment a module with additional tables, set security filters on the data, then show a dashboard from different users to see how the filters control data visible to the user.

From  2700041NBR 2700041NBR

What is NLP?

In this lightboard video, Master Inventor with IBM, Martin Keen, visually explains what NLP is and why we need it, as well as how NLP takes unstructured human speech and converts it to structured…

From  chq_master_librarians

What is Single Sign-On?

Jeff Crume explains how a much better option, Single-Sign On or SSO, can help you manage a mountain of passwords without compromising security.

From  chq_master_librarians

IBM Guardium AI Security: Manage data model security risk

IBM Guardium AI Security empowers you to discover generative AI deployments, mitigate vulnerabilities in AI models, protect sensitive data, and address regulatory requirements—all on a single…

+4 More
From  chq_master_librarians

Cloud Security Risks: Exploring the latest Threat Landscape Report

The cloud is a prime target for cyber attacks, but there are steps you can take to protect your organization. Join cybersecurity expert Jeff Crume as he discusses the latest cloud security threats…

+5 More
From  chq_master_librarians

IBM MaaS360: Frontline Device Management

The IBM MaaS360 unified endpoint management (UEM) solution has been built to help you manage and protect the frontline workforce's devices, apps, and data no matter their location, enabling them…

+4 More
From  chq_master_librarians

What is Shift-Left Security?

In this video, we explore the concept of Shift-Left Security, a software development methodology that integrates security into every stage of the development lifecycle. By shifting security left,…

+5 More
From  chq_master_librarians

Secure your APIs end-to-end

Learn why a holistic API security strategy is critical to ensuring your APIs are protected not only from misconfigurations and vulnerabilities, but from more advanced malicious attacks. See both…

From  chq_master_librarians

Security vs. Privacy

If you're not paying, you're likely the product. In this video, Jeff Crume explains that statement as well as the impact on user privacy and data security, and how organizations manage…

From  chq_master_librarians

Mobile Threat Defense: Protecting Your Mobile Devices from Attacks

In this video, Colin Shank discusses the importance of mobile threat defense in today's mobile-centric world. He explains how mobile devices are vulnerable to attacks, including phishing links,…

From  chq_master_librarians

Security definition validation for CICS TS

When you deliver CICS application changes into production, are you manually identifying required security changes? Check out security definition validation (SDV) for CICS TS. It contributes towards…

+12 More
From  270005DUQB 270005DUQB

The next big leap in cryptography: NIST’s post-quantum cryptography standards

The next big leap in encryption has officially been shared in this special webcast. IBM Fellow Ray Harishankar discusses the landmark post-quantum cryptography standards developed by IBM in…

+7 More
From  Quantum Experience

La cloud híbrida diseñada con y para la IA generativa: la arquitectura que la IA necesita - Panel de Clientes

Con la proliferación de la IA generativa, el volumen de datos continúa expandiéndose de forma exponencial, y se espera que la cantidad de datos almacenados aumente más del…

From  chq_master_librarians

La cloud híbrida diseñada con y para la IA generativa: la arquitectura que la IA necesita - Panel de Cliente

Con la proliferación de la IA generativa, el volumen de datos continúa expandiéndose de forma exponencial, y se espera que la cantidad de datos almacenados aumente más del…

From  chq_master_librarians

Scale your tech with a dynamic duo - AI and hybrid cloud

The key to harnessing AI’s full potential is integrating it across all your data – whether on-prem, in the cloud, or at the edge. In this episode, our host Albert Lawrence and guests…

From  chq_master_librarians