Cybersecurity Architecture: Endpoints Are the IT Front Door - Guard Them

Sdílet
Vložit
  • čas přidán 4. 06. 2024
  • IBM Security QRadar EDR : ibm.biz/BdySEq
    IBM Security X-Force Threat Intelligence Index 2023: ibm.biz/BdySEf
    The prior video in the series covered identity and access management (IAM), which Jeff "the security guy" described as the new perimeter. Of course, none of those access precautions, like multi-factor authentication, will matter if you can't trust the platform that it's coming from. In this video, Jeff Crume explains how to assure that endpoints are in fact secure and can be trusted.
    Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
    Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
    #AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #endpointsecurity

Komentáře • 39

  • @tanbirprodhan888
    @tanbirprodhan888 Před 3 dny

    One of the best series of videos on holistic cyber security. Amazing. I have been hugely benefited from this

  • @chanyuan-cv4op
    @chanyuan-cv4op Před 11 měsíci +16

    This is my favorite teacher.🧑‍🏫❤

    • @jeffcrume
      @jeffcrume Před 11 měsíci +2

      Thank you! Very nice of you to say so!

  • @appleman9236
    @appleman9236 Před měsícem +1

    This series single handedly resparked my interest in cybersecurity. Thank you

  • @NambiarRam
    @NambiarRam Před 5 měsíci +4

    All 10 Videos are very educative and provide greater insight into Cybersecurity framework, domains and over all detection and response strategy. Thanks Professor

    • @jeffcrume
      @jeffcrume Před 4 měsíci

      Thanks so much for watching and commenting!

  • @mthoko
    @mthoko Před 11 měsíci +5

    You’re a brilliant educator

    • @jeffcrume
      @jeffcrume Před 11 měsíci

      @mthoko you are far too kind but thank you for saying so!

  • @707neon
    @707neon Před 11 měsíci +5

    This series is Amazing!!!

    • @jeffcrume
      @jeffcrume Před 11 měsíci

      Thanks for saying so @707neon!

  • @shubhdey553
    @shubhdey553 Před 10 měsíci +6

    Hi Professor - The videos you post on Cybersecurity are great and pretty concise yet provides a holistic view. Could you also make videos on IT audit and steps to perform them

    • @jeffcrume
      @jeffcrume Před 10 měsíci

      Thanks for the suggestion! Unfortunately, I don’t have a background in audit so I’m afraid I wouldn’t do the topic justice

  • @Douglas_Gillette
    @Douglas_Gillette Před 11 měsíci +5

    This is a great video. It reminds me of something that Snowden revealed: the NSA is not too bothered by encryption because most devices have weak endpoint security. That means they can easily intercept your phone, laptop, or smart TV traffic and access your data via local methods, such as your device’s operating system or hardware.
    Encryption is one of the best ways to protect your privacy online, but it’s not enough if your device is vulnerable.

    • @velo1337
      @velo1337 Před 11 měsíci +1

      that was years ago when he actually worked in the field. now we got hardwarelevel encryption build in nearly everywhere

    • @jeffcrume
      @jeffcrume Před 11 měsíci +1

      Excellent point. Security, like a chain, is only as strong as its weakest link

    • @jeffcrume
      @jeffcrume Před 11 měsíci +1

      @@velo1337hat’s a definitely improvement but, still, if the endpoint has been jailbroken or has a weak (or no) password, etc., it can be breached

  • @rodgoldsmith9452
    @rodgoldsmith9452 Před 11 měsíci +2

    Good stuff. Been taking notes and replaying episodes back to back.

    • @jeffcrume
      @jeffcrume Před 11 měsíci

      I love to hear this!

  • @aruizsilva
    @aruizsilva Před 5 měsíci +1

    Such a wonderful explanation. Thank you very much!

    • @jeffcrume
      @jeffcrume Před 4 měsíci

      Thanks for saying so!

  • @dragonsniper503
    @dragonsniper503 Před 2 měsíci +1

    Great instructor thank you

    • @jeffcrume
      @jeffcrume Před 2 měsíci

      Thanks so much for saying so!

  • @soh3il9
    @soh3il9 Před 6 měsíci +1

    Your sound so much like Steve Jobs, and you explain really well

    • @jeffcrume
      @jeffcrume Před 6 měsíci +1

      That’s really high praise as Steve was such an amazing communicator. Only in my dreams could I approach his level. Thanks for the compliment!

  • @Pem7
    @Pem7 Před 2 měsíci +1

    Designing and building systems with security in mind is a defense not so stressed enough 🤞.

  • @broakwasi8209
    @broakwasi8209 Před 11 měsíci +2

    Salute sir

  • @Vagabond_Shinobi
    @Vagabond_Shinobi Před 29 dny

    Woah when he said subscribe the subscribe button did a cool animation i never seen that on CZcams lol i must be in fullscreen too often

  • @mauriciosouzarodriguesdacu5516
    @mauriciosouzarodriguesdacu5516 Před 11 měsíci +2

    Very good

  • @venkat270484
    @venkat270484 Před 9 měsíci +1

    Hey Professor,
    I was just try first cybersecurity video for testing, It is very interesting session and very clean, very excellent explanation.
    Thank you so much IBM and Team. 💌🥰🥰🥰🥰🥰🥰🍺🍺🍺

    • @jeffcrume
      @jeffcrume Před 8 měsíci

      You’re very welcome @venkat270484!

  • @mrb180
    @mrb180 Před 8 měsíci +1

    A good weak endpoint security analogy would be alike to a submarine doing its job, looking above the waters through its periscope trying to stalk and remain unnoticed, while behind it there's a undetected enemy sub.

  • @Runclimblift
    @Runclimblift Před 3 měsíci +1

    Something that has confused me in this space, 'monitor usage' this sounds more like you're monitoring time consumption rather than what you're consuming.
    Or is that just me from an MSP Billing space

    • @jeffcrume
      @jeffcrume Před 2 měsíci

      Since I’m focused on the security context, I’m more interested in monitoring for abnormal events

  • @emc3000
    @emc3000 Před 9 měsíci +1

    Maybe a silly question, but would QR codes be considered an attack surface? I see QR codes linked to online menus and instruction manuals for products as a very dangerous attack vector similar to juice jacking.

    • @jeffcrume
      @jeffcrume Před 9 měsíci

      @emc3000 for sure. Maybe a good topic for a future video…

    • @emc3000
      @emc3000 Před 9 měsíci

      @jeffcrume Thanks! I actually have a lot of thoughts/ideas about socially engineered attack vectors, but as I am not criminally oriented, not sure who will employ me to consult about this 😅🤣

  • @rametelalema3811
    @rametelalema3811 Před 7 měsíci

    Hi professor please I biginner the ICT so need special assistance help me. ❤

  • @gmanonDominicana
    @gmanonDominicana Před 11 měsíci +4

    Plenty of common sense.