IBM Technology
Tech Talk: What is Public Key Infrastructure (PKI)?
updated
Make sure to check out the IBM Cloud Blog for a full rundown of all announcements: http://ibm.biz/cloud-blog-announcements
Check out the following resources:
(00:19) 1. AI on IBM Z: https://ibm.biz/ai-on-ibm-z
(01:33) 2. IBM Maximo Application Suite 8.11: https://ibm.biz/IBM-Maximo-Application-Suite-8-11
(02:47) 3. IBM NS1 Connect: https://ibm.biz/ibm-ns1-connect
Subscribe to the IBM Cloud channel to be notified when a new IBM Tech Now video publishes → http://ibm.biz/subscribe-now
Thanks to the Internet of Things (IoT), devices are much "smarter". But because these are essentially small computers, everything from a programmable light bulb to programmable thermostat can be hacked, as well as the myriad other modern conveniences like cloud-enabled refrigerators, cars, and security cameras. In this video, IBM Distinguished Engineer Jeff Crume explains the risks of IoT devices and ways you can reduce your security exposure both at home and the office.
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#AI #Software #ITModernization #IoT #cybersecurity #JeffCrume
Containerization play a key role in modern application development, but do you have a strategy for managing your container resources? In this video Chris Rosen walks through four use cases for development and operations to help you maximize performance and uptime, minimize cost, stay agile, and remain in compliance.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-today
Explore IBM Z → https://ibm.biz/BdMzZQ
Millions of financial transactions are processed on System Z every day. Fraud detection is a high priority and AI offers a better way to detect it -- IF there's enough time to handle the validation. In this video, IBM Fellow Rosalind Radcliffe presents a real-world credit card scenario with AI-based fraud detection that has the potential to validate all transactions, leading to less fraudulent credit card purchases.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-today
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#ai #mainframe #zos
How did a lottery organization uncover an insider scam? How could you avoid falling prey to a similar operation? Abenezer Gebrehiwot shares the stories and lessons with Dan Kehn in this video.
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
You've almost certainly heard of Docker, but what about Podman? It's an open source alternative container engine based on the same OCI standard. In this video, Cedric Clyburn from Red Hat explains how Podman's architecture differs from Docker and points out several advantages, including Podman's support for pods, similar to Kubernetes.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-today
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#IBM #AI #Software #ITModernization #Mainframe #Containers #Redhat
Legacy applications runs mission critical applications in almost every organization. There are opportunities for lots of performance gains and cost savings, but refactoring these older applications is difficult work. Well, it may be getting a little easier. In this video Martin Keen walks through six ways generative AI can help, like creating documentation, reverse engineering, code generation.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-now
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
Make sure to check out the IBM Cloud Blog for a full rundown of all announcements: http://ibm.biz/cloud-blog-announcements
Check out the following resources:
(00:16) 1. The IBM Security X-Force Cloud Threat Landscape Report: https://ibm.biz/itn-cloud-threat-landscape-report
(01:49) 2. IBM Intelligent Remediation: https://ibm.biz/itn-ibm-intelligent-remediation
Subscribe to the IBM Cloud channel to be notified when a new IBM Tech Now video publishes → http://ibm.biz/subscribe-now
The recent interest in AI as meant a lot of people have been encountering new vocabulary. Martin Keen is to help you sort it out. This video runs through key terms like machine learning, deep learning, foundation models, and large language models and how they're related to each other.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-now
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
Take a 30-day trial of App Connect → https://ibm.biz/App-Connect-Trial
iPaaS, or Integration-Platform-as-a-Service, is a self-service cloud-based solution that standardizes how applications are integrated.
OK, so what does that mean & how can iPaaS help you?
Annelise Morgan is here to answer these questions and explain how iPaaS can provide a single solution and a consistent process for data exchange and data integration between all the applications in your enterprise, whether they’re on-premises or in the cloud.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-today
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#ipaas #cloud #integration
AI promises to touch every aspect of work and life, but how do they get made?
In this video Martin keen walks through a five step framework for how to build and deploy AI models.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-now
Earn a badge for Git! → https://ibm.biz/Badge-Git-and-GitHub
Do you keep hearing this, "You gotta get Git!"?
If you work in the mainframe space, you might be wondering if Git even applies to your work. In this video, Rosalind Radcliffe dispels myths, exposes lies, and sheds light on the many ways Git can bring value to your work.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-today
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#git #mainframe #zos #itmodernization
Learn more about watsonx → https://ibm.biz/BdMXPq
IBM has a long tradition of contributing to open source projects, leading open source projects, and most importantly, delivering offerings based on open source. The latest announcement of watsonx builds on this tradition; in this video, Brad Topol, IBM Distinguished Engineer and Director of Open Technologies, presents four noteworthy open source projects that underpin watsonx, the IBM AI platform.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-now
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
When it comes to eCommerce or just getting answers to their questions, more and more consumers prefer a chat interface to emailing or phoning a company. With the ever-increasing sophistication of conversational AI, you may be considering how to offload some of these exchanges to chatbots. In this video, Bella Church presents three possibilities: Rules-based, AI-powered, and generative AI chatbots. She covers the strengths of each to help you decide which is the best fit for your company and customers.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-now
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
Make sure to check out the IBM Cloud Blog for a full rundown of all announcements: http://ibm.biz/cloud-blog-announcements
Check out the following resources:
(00:20) 1. IBM watsonx Code Assistant for Z: https://ibm.biz/itn-watsonx-code-assistant-for-z
(01:48) 2. The Cloud Migration Acceleration Program with IBM Power Virtual Server: https://ibm.biz/cloud-migration-acceleration-program
(3:00) 3. The beta program for 4th Gen Intel® Xeon® Scalable processors on IBM Cloud Virtual Servers for VPC is officially live: https://ibm.biz/beta-for-the-newest-intel-xeon-processors
Subscribe to the IBM Cloud channel to be notified when a new IBM Tech Now video publishes → http://ibm.biz/subscribe-now
AI for cybersecurity → https://ibm.biz/BdMzYR
Large Language Models (LLMs), like any new technology, are subject to the risk that "malicious actors" will abuse it for financial or other gain by attempting to circumvent built-in security measures. The well-known Open Worldwide Application Security Project or OWASP project has recently published their list of top 10 security risks for LLMs. In this video, IBM Distinguished Engineer Jeff Crume explains a subset of them and what you can do to protect you and your users.
Get started for free on IBM Cloud → https://ibm.biz/buildonibmcloud
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
0:00 What is the OWASP Top 10 for LLMs?
1:25 Prompt Injection (Direct)
3:37 Prompt Injection (Indirect)
6:43 Insecure Output Handling
8:55 Training Data
11:46 Over Reliance
Check out IBM's DevOps solutions → https://ibm.biz/ibm-devops-solutions
What exactly is DevOps - and how does DevOps' culture and practices fit into the mainframe world?
Rosalind Radcliffe is here to answer these questions, explain why DevOps and the mainframe go together, and how taking advantage of DevOps' automation and modern ways of working can streamline your mainframe process.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-today
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#devops #itmodernization #mainframe
Intro to Kubeflow Pipelines → https://ibm.biz/kubeflow-pipelines-overview
Looking to transform your machine learning workflow while benefiting from Kubernetes? In this video, David Adeyemi provides an intro to Kubeflow, the concept of Kubeflow Pipelines, and more.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-today
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#kubeflow #mlops #ml #ai #kubernetes
Dan Kehn talks to IBM X-Force Incident Response Consultant, Meg West to highlight what response consultants do, from education, developing custom strategies, running simulations, and identifying and highlighting the most important takeaways to protect an organization from cybersecurity vulnerabilities.
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#cybersecurity
Learn more about RAG→ https://ibm.biz/BdMsRt
Large language models usually give great answers, but because they're limited to the training data used to create the model, over time they can become incomplete--or worse, generate answers that are just plain wrong. One way of improving the LLM results is called "retrieval-augmented generation" or RAG. In this video, IBM Senior Research Scientist Marina Danilevsky explains the LLM/RAG framework and how this combination delivers two big advantages, namely: the model gets the most up-to-date and trustworthy facts, and you can see where the model got its info, lending more credibility to what it generates.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-now
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
Make sure to check out the IBM Cloud Blog for a full rundown of all announcements: http://ibm.biz/cloud-blog-announcements
Check out the following resources:
(00:19) 1. The announcement of Cloudflare Bot Management on IBM CIS: https://ibm.biz/Cloudflare-and-IBM-CIS
(01:55) 2. X-Force's detection and response framework for MFTs: https://ibm.biz/Detection-and-Response-Framework-for-MFTs
Subscribe to the IBM Cloud channel to be notified when a new IBM Tech Now video publishes → http://ibm.biz/subscribe-now
► Earn a badge with FREE browser-based Kubernetes labs: http://ibm.biz/browser-based-k8-hands-on-labs
Get started on IBM Cloud for free → http://ibm.biz/start-no-cost-cloud-lite-account
#IBMCloud #IBMNews #IBMCloudAnnouncements
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Are you considering a career in cybersecurity, but have questions? There's a good chance some of them made it into Jeff Crume and Wes Pretsch's career FAQ. If they didn't answer your question, post yours in the comments and we'll put them in the list for consideration in the next career FAQ.
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
Python is one of the most popular programming languages, but why? In this video, Wes Pretsch covers four reasons why developers like him love Python! By the way, if he missed one of your top four, please let us know in the comments.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-now
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#python #programming
Learn more about red teaming → https://ibm.biz/what-is-red-teaming
While red teaming evaluates an organization's security stance at a specific time, it can prove costly and time-consuming. Enter Continuous Automated Red Teaming (CART), a game-changing approach that revolutionizes red teaming in cybersecurity.
In this video, Sam Hector explains how by operating seamlessly round-the-clock, CART tackles these challenges head-on, delivering dynamic and cost-effective security assessments that keep pace with today's ever-changing threat landscape.
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
Edge Computing Solutions: https://ibm.biz/BdMxtq
IBM Developer Advocate Dan Kehn explains the importance of Containers at the Edge and how this helps us to bring tech out of the cloud and onto the devices we use every day in a scalable and secure way.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-today
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#IBM #AI #Software #ITModernization #edgecomputing #Containers #Samsung
How much does it cost when hackers breach an organization's cybersecurity? How long does it take to contain? How do you reduce the cost and recover faster? Jeff Crume provides a summary of the IBM Cost of a Data Breach 2023, the methodologies, and recommendations to improve your organization's IT security and protect your data from hackers.
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#ibmcloud #cybersecurity #software #jeffcrume
Learn more about Shadow IT → https://ibm.biz/what_is_shadow_it
Have you heard the term "Shadow IT"? Wondering what it is and why it might cause such concern for enterprise businesses?
In this video, Isabella Rocha explains not only what it is, but the risks & benefits, how it affects organizations, and how you can mitigate the risks to your business.
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#cybersecurity #randori
Learn More: Reduce Attack Surface Exposures → https://ibm.biz/blog-reduce-exposure
Attack Surface Management (ASM) and Vulnerability Management help improve the cybersecurity posture of your business. While ASM provides a more holistic view, vulnerability management offers a singular focus on detecting and resolving cybersecurity vulnerabilities.
In this video, Sam Hector explains why you need BOTH of them to provide a truly proactive and comprehensive security strategy.
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#ASM #Randori #cybersecurity
Make sure to check out the IBM Cloud Blog for a full rundown of all announcements: http://ibm.biz/cloud-blog-announcements
Check out the following resources:
(00:20) 1. IBM named a leader in ESG reporting: https://ibm.biz/ibm-named-a-leader-in-esg-reporting
(01:23) 2. The new European MZR in Spain: https://ibm.biz/new-european-mzr-in-spain
(01:23) 3. ICCT’s “Summer of Certification”: https://ibm.biz/icct-summer-of-certification
Subscribe to the IBM Cloud channel to be notified when a new IBM Tech Now video publishes → http://ibm.biz/subscribe-now
► Earn a badge with FREE browser-based Kubernetes labs: http://ibm.biz/browser-based-k8-hands-on-labs
Get started on IBM Cloud for free → http://ibm.biz/start-no-cost-cloud-lite-account
#IBMCloud #IBMNews #IBMCloudAnnouncements
Wondering what embeddable AI is, how one actually goes about embedding AI ... and where?
In this video, Martin Keen talks about AI deployment, specifically how to deploy embeddable AI, and centers his discussion on the 2 major methods: containerized libraries and applications.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-now
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#ai #watsonx
IBM Security X-Force Threat Intelligence Index 2023: https://ibm.biz/Bdy3nL
Cost of a Data Breach Report 2023: https://ibm.biz/breach_report_2023
Remember that security = prevention + detection + response. In this final episode of the Cybersecurity Architecture series, Jeff “the security guy” covers incident response. Who is responsible? What systems do they use to do their job? What can be automated and what can’t? How about the potential consequences of a data breach — do you need to be worried about your bottomline? All these questions will be answered.
Watch all videos in the Cybersecurity Architecture series: https://ibm.biz/cybersecurity_video_series
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #response
Docker is synonymous with containers, but that doesn't mean it's the only choice. Podman is an open source alternative container engine based on the same OCI standard. In this video, Cedric Clyburn from Red Hat explains how compares Podman and Docker, showing their relative advantages and disadvantages.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-today
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#docker #podman
How Generative AI works and why it matters → https://ibm.biz/How_Generative_AI_works
Foundation Models → https://ibm.biz/Foundation_Models_Today
Large language models-- or LLMs --are a type of generative pretrained transformer (GPT) that can create human-like text and code. There's a lot of talk about GPTs and LLMs lately, but they've actually been around for years! In this video, Martin Keen briefly explains what a LLM is, how they relate to foundation models, and then covers how they work and how they can be used to address various business problems.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-now
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#llm #gpt #gpt3 #largelanguagemodel #watsonx #GenerativeAI #Foundationmodels
IBM Security X-Force Threat Intelligence Index 2023: https://ibm.biz/BdyQbx
Security is about prevention, detection, and response. In this installment, IBM Distinguished Engineer and adjunct professor Jeff Crume explains the tools that are key to detecting an attack as soon as possible. He also clarifies the often-confused distinction between SIEM and XDR systems by delving into their historical usage, noting they're not either/or choices, but complementary tools that experienced cybersecurity analysts use with the help of federated search capabilities.
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #detection
What is a mainframe? → https://ibm.biz/BdySXR
Mainframes have been around for a long time and they rightly have the reputation for being massively scalable and reliable. Containers are, relatively speaking, the "new kid" on the block who's wildly popular. In this video, IBM Fellow Rosalind Radcliffe explains how it's not an either/or decision - apply the fit-for-purpose principle and get the best of both platforms.
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#AI #Software #ITModernization #Mainframe #containers
Make sure to check out the IBM Cloud Blog for a full rundown of all announcements: http://ibm.biz/cloud-blog-announcements
Check out the following resources:
(00:19) 1. IBM Security's Cost of a Data Breach 2023: https://ibm.biz/codb2023-itn
(01:16) 2. Cost of a Data Breach key findings: https://ibm.biz/codb2023-whats-new
Subscribe to the IBM Cloud channel to be notified when a new IBM Tech Now video publishes → http://ibm.biz/subscribe-now
► Earn a badge with FREE browser-based Kubernetes labs: http://ibm.biz/browser-based-k8-hands-on-labs
Get started on IBM Cloud for free → http://ibm.biz/start-no-cost-cloud-lite-account
#IBMCloud #IBMNews #IBMCloudAnnouncements
Learn about current cybersecurity threats →https://ibm.biz/Bdy92q
Advances in AI are impacting many industry disciplines and cybersecurity is no different. The tried-and-true strategies for threat management and detection are evolving to take advantage of AI, making their approach more proactive. In this video, Bob Kalka of IBM Security presents the developing landscape of cybersecurity based on years of consulting with companies like yours, explaining the domains your cybersecurity team needs to focus on as part of your modernization journey.
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
IBM Security X-Force Threat Intelligence Index 2023: https://ibm.biz/BdyJLp
Many companies refer to their data as the "crown jewels" for a reason - it represents one of a company's most valuable assets. That's also why preventing a data breach should be at the top of your security priorities. In this video, IBM Distinguished Engineer and Adjunct Professor lays out the concerns of data security and explains the processes you should have in place to discover, secure, and govern your data across your enterprise.
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #datasecurity
NumPy and SciPy are two Python libraries that on the surface, appear to overlap significantly, but there's a reason: SciPy is actually built on top of NumPy. So where does SciPy add functionality beyond NumPy? In this video, Martin Keen explains how SciPy enhances NumPy by adding further functionality for more complex mathematical and scientific computing tasks. With this side-by-side comparison, you can intelligently pick the best for your application.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-now
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#python #scipy #numpy
Read: Data Sovereignty at the Edge → https://ibm.biz/data-sovereignty-at-the-edge
Sovereign cloud is a multi-factor consideration in your cloud adoption strategy. Where does your data reside? How are privacy and local laws respected with regard to sensitive data? Are cloud operations local, remote, or a mix? Are your processes and systems auditable? What's the right balance between innovation and risk? In this video, IBM Fellow Nataraj Nagaratnam lays all these questions out in the context of three fictitious companies, Privacy Inc., Always-On Inc., and Govern-It, Inc.
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#cloud #edge #governance
IBM Security X-Force Threat Intelligence Index 2023: https://ibm.biz/BdymjZ
Software bugs, they are a fact of life. But the longer they remain undetected, the higher the cost of fixing them... and the higher risk of security vulnerabilities that malicious actors can exploit. In this installment of the Cybersecurity Architecture series, IBM Distinguished Engineer and Adjunct Professor Jeff Crume explains the software bug lifecycle and how it can be better addressed through proactive processes that replace the traditional development/operations "over the wall" approach.
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #applicationsecurity
Discover the power of watsonx.data, a data store built on an open data lakehouse. See how the solution can help data management challenges such as reducing data warehouse costs and unifying data across any hybrid cloud and on-premises environments.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-now
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#watsonx #lakehouse #datalake
Make sure to check out the IBM Cloud Blog for a full rundown of all announcements: http://ibm.biz/cloud-blog-announcements
Check out the following resources:
(00:21) 1. The GA of IBM AIOps Insights: https://ibm.biz/ibm-aiops-insights
(01:28) 2. New IBM Turbonomic tools: https://ibm.biz/energy-and-carbon-emission-tools-for-ibm-turbonomic
(02:28) 3. The G2 Summer Reports: https://ibm.biz/g2-summer-reports-itn
Subscribe to the IBM Cloud channel to be notified when a new IBM Tech Now video publishes → http://ibm.biz/subscribe-now
► Earn a badge with FREE browser-based Kubernetes labs: http://ibm.biz/browser-based-k8-hands-on-labs
Get started on IBM Cloud for free → http://ibm.biz/start-no-cost-cloud-lite-account
#IBMCloud #IBMNews #IBMCloudAnnouncements
Federated learning is a way to train AI models without anyone seeing or touching your data, offering a way to unlock information to feed new AI applications. In this video, Martin Keen discusses the forms, benefits and challenges of federated learning.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-now
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#ai #watsonx #llm
IBM Security X-Force Threat Intelligence Index 2023 → https://ibm.biz/Bdymsv
Networks are your company's connection to the world, and therefore one of they key players in a cybersecurity architecture. In the sixth installment of the series, IBM Distinguished Engineer and Adjunct Professor Jeff Crume introduces and explains the elements of network security, including firewalls, VPNs, and lower-level topics like network packet security-risk detection.
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #networksecurity
What is three-tier architecture? → https://ibm.biz/BdyaqK
Bots are common place on the internet, but how do you ensure you're not overrun by resource consuming requests from "bad bots." IBM Developer Advocate, Dan Kehn, explains the components and strategy you can add to your classic three-tier architecture to help protect your resources and provide the best experience for your users. So when bad bots come for you, you'll know what to do.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-today
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
Chapters
00:00 What is a "bad bot"?
01:17 Three parts of the solution
01:37 Original three-tier web topology
02:00 New components of the solution
03:30 Web Application Firewall (WAF)
04:20 What is bad behavior?
05:42 Challenging bad behavior
06:51 Caveats
#bot #malware #DDoS #webdevelopment #performance
Check out the X-Force Threat Intelligence Index 2023 → https://ibm.biz/read-TII2023
So, maybe you know that "malware" is malicious software - but wondering how that works, and more importantly: how to protect yourself from it?
Never fear, Wes Pretsch is here to give you an example of how a bad actor can make and distribute malware - and how you can avoid it.
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#malware #malwareprotection #cybersecurity #cybercrime
Want to save the world and have a shot at winning prizes from a pool with funding of up to $1.4M USD? The 2023 Call for Code Global Challenge is a great way to build your AI skills while building tech solutions to improve sustainable resource management, reduce pollution, and protect biodiversity to create a greener future for all.
Get started for free on IBM Cloud → https://ibm.biz/sign-up-now
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#hack #hackathon #ai #sustainability