Cybersecurity Architecture: Endpoints Are the IT Front Door - Guard Them

preview_player
Показать описание


The prior video in the series covered identity and access management (IAM), which Jeff "the security guy" described as the new perimeter. Of course, none of those access precautions, like multi-factor authentication, will matter if you can't trust the platform that it's coming from. In this video, Jeff Crume explains how to assure that endpoints are in fact secure and can be trusted.

#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #endpointsecurity
Рекомендации по теме
Комментарии
Автор

I love your teaching. highly detailed and great

mosunabdulai
Автор

This series single handedly resparked my interest in cybersecurity. Thank you

appleman
Автор

I will forever watch Jeff’s videos 😊😊😊😊😊😊😊😊

claudiabucknor
Автор

One of the best series of videos on holistic cyber security. Amazing. I have been hugely benefited from this

tanbirprodhan
Автор

I’m learning so much from this series. Planning on getting one of the cybersecurity certificates on coursera, if Jeff is the instructor on the IBM program I’m now inclined to choose that one over Google’s.

SKuLKZ
Автор

All 10 Videos are very educative and provide greater insight into Cybersecurity framework, domains and over all detection and response strategy. Thanks Professor

NambiarRam
Автор

Hi Professor - The videos you post on Cybersecurity are great and pretty concise yet provides a holistic view. Could you also make videos on IT audit and steps to perform them

shubhdey
Автор

This is a great video. It reminds me of something that Snowden revealed: the NSA is not too bothered by encryption because most devices have weak endpoint security. That means they can easily intercept your phone, laptop, or smart TV traffic and access your data via local methods, such as your device’s operating system or hardware.

Encryption is one of the best ways to protect your privacy online, but it’s not enough if your device is vulnerable.

Douglas_Gillette
Автор

Woah when he said subscribe the subscribe button did a cool animation i never seen that on YouTube lol i must be in fullscreen too often

Vagabond_Shinobi
Автор

Good stuff. Been taking notes and replaying episodes back to back.

rodgoldsmith
Автор

Hey Professor,

I was just try first cybersecurity video for testing, It is very interesting session and very clean, very excellent explanation.

Thank you so much IBM and Team. 💌🥰🥰🥰🥰🥰🥰🍺🍺🍺

venkat
Автор

Such a wonderful explanation. Thank you very much!

aruizsilva
Автор

Your sound so much like Steve Jobs, and you explain really well

sohil
Автор

Designing and building systems with security in mind is a defense not so stressed enough 🤞.

Pem
Автор

A good weak endpoint security analogy would be alike to a submarine doing its job, looking above the waters through its periscope trying to stalk and remain unnoticed, while behind it there's a undetected enemy sub.

mrb
Автор

Something that has confused me in this space, 'monitor usage' this sounds more like you're monitoring time consumption rather than what you're consuming.
Or is that just me from an MSP Billing space

Runclimblift
Автор

Maybe a silly question, but would QR codes be considered an attack surface? I see QR codes linked to online menus and instruction manuals for products as a very dangerous attack vector similar to juice jacking.

emc
Автор

Hi professor please I biginner the ICT so need special assistance help me. ❤

rametelalema