Search for tag: "security"
Hacking Generative AI: Limiting security risk in the age of AIWhile 81% of executives stress the importance of secure and trustworthy AI, only 24% of AI projects are secure. Is it ever ok to prioritize innovation over security when it comes to AI? Listen to… |
|
Security filters in data modulesIn this video we will augment a module with additional tables, set security filters on the data, then show a dashboard from different users to see how the filters control data visible to the user. |
|
What is NLP?In this lightboard video, Master Inventor with IBM, Martin Keen, visually explains what NLP is and why we need it, as well as how NLP takes unstructured human speech and converts it to structured… |
|
What is Single Sign-On?Jeff Crume explains how a much better option, Single-Sign On or SSO, can help you manage a mountain of passwords without compromising security. |
|
IBM Guardium AI Security: Manage data model security riskIBM Guardium AI Security empowers you to discover generative AI deployments, mitigate vulnerabilities in AI models, protect sensitive data, and address regulatory requirements—all on a single… |
|
Cloud Security Risks: Exploring the latest Threat Landscape ReportThe cloud is a prime target for cyber attacks, but there are steps you can take to protect your organization. Join cybersecurity expert Jeff Crume as he discusses the latest cloud security threats… |
|
IBM MaaS360: Frontline Device ManagementThe IBM MaaS360 unified endpoint management (UEM) solution has been built to help you manage and protect the frontline workforce's devices, apps, and data no matter their location, enabling them… |
|
What is Shift-Left Security?In this video, we explore the concept of Shift-Left Security, a software development methodology that integrates security into every stage of the development lifecycle. By shifting security left,… |
|
Secure your APIs end-to-endLearn why a holistic API security strategy is critical to ensuring your APIs are protected not only from misconfigurations and vulnerabilities, but from more advanced malicious attacks. See both… |
|
Security vs. PrivacyIf you're not paying, you're likely the product. In this video, Jeff Crume explains that statement as well as the impact on user privacy and data security, and how organizations manage… |
|
Mobile Threat Defense: Protecting Your Mobile Devices from AttacksIn this video, Colin Shank discusses the importance of mobile threat defense in today's mobile-centric world. He explains how mobile devices are vulnerable to attacks, including phishing links,… |
|
Security definition validation for CICS TSWhen you deliver CICS application changes into production, are you manually identifying required security changes? Check out security definition validation (SDV) for CICS TS. It contributes towards… |
|
The next big leap in cryptography: NIST’s post-quantum cryptography standardsThe next big leap in encryption has officially been shared in this special webcast. IBM Fellow Ray Harishankar discusses the landmark post-quantum cryptography standards developed by IBM in…
From Quantum Experience
|
|
La cloud híbrida diseñada con y para la IA generativa: la arquitectura que la IA necesita - Panel de ClientesCon la proliferación de la IA generativa, el volumen de datos continúa expandiéndose de forma exponencial, y se espera que la cantidad de datos almacenados aumente más del… |
|
La cloud híbrida diseñada con y para la IA generativa: la arquitectura que la IA necesita - Panel de ClienteCon la proliferación de la IA generativa, el volumen de datos continúa expandiéndose de forma exponencial, y se espera que la cantidad de datos almacenados aumente más del… |
|
Scale your tech with a dynamic duo - AI and hybrid cloudThe key to harnessing AI’s full potential is integrating it across all your data – whether on-prem, in the cloud, or at the edge. In this episode, our host Albert Lawrence and guests… |