Cybersecurity Architecture: Detection

Sdílet
Vložit
  • čas přidán 27. 08. 2024
  • IBM Security QRadar EDR : ibm.biz/BdyQeU
    IBM Security X-Force Threat Intelligence Index 2023: ibm.biz/BdyQbx
    Security is about prevention, detection, and response. In this installment, IBM Distinguished Engineer and adjunct professor Jeff Crume explains the tools that are key to detecting an attack as soon as possible. He also clarifies the often-confused distinction between SIEM and XDR systems by delving into their historical usage, noting they're not either/or choices, but complementary tools that experienced cybersecurity analysts use with the help of federated search capabilities.
    Get started for free on IBM Cloud → ibm.biz/ibm-cl...
    Subscribe to see more videos like this in the future → ibm.biz/subscri...
    #AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #detection

Komentáře • 42

  • @naijagemstones6604
    @naijagemstones6604 Před 2 měsíci +4

    Jeff you are too much. Pls we need more series on deferent areas. Thanks once again. Greetings from Africa Nigeria

  • @jemimaho.4827
    @jemimaho.4827 Před 28 dny +2

    I've been liking comments so far because there are already so many comments that mention just how awesome this series is. Now, I've absolutely gotta drop mine. Thank you so much for this series (@ Jeff and IBM). I love how it puts everything into perspective; it's helped me see how topics I previously touched on in isolation fit into the larger security picture. I will come back to rewatch the entire series in a few months.

    • @jeffcrume
      @jeffcrume Před 16 dny +2

      I’m so glad to hear that you enjoyed it!

  • @jon34153
    @jon34153 Před 6 měsíci +6

    I can imagine this series becoming a classic. Absolutely great content!

  • @melbouananimelbouanani7561

    If I could hit the like button 1 million times I would do it, the content is extraordinary, words are not enough to thank you.
    Big thanks IBM

    • @IBMTechnology
      @IBMTechnology  Před rokem

      Wow, thank you!

    • @jeffcrume
      @jeffcrume Před 11 měsíci +1

      @melbouananimelbouanani7561 thanks so much for the enthusiastic complements!!!

  • @PHElectronics
    @PHElectronics Před rokem +6

    I have been following this series from no 1 thanks for making this videos

    • @jeffcrume
      @jeffcrume Před rokem

      Thanks so much for continuing to watch!

  • @venkat270484
    @venkat270484 Před 11 měsíci +5

    SIEM and XDR was excellent concept, Thanks for your videos

    • @jeffcrume
      @jeffcrume Před 11 měsíci

      You’re very welcome!

  • @toenytv7946
    @toenytv7946 Před rokem +6

    Wow that was a mouthful of security. Nice!

  • @LucyLucy66859
    @LucyLucy66859 Před 2 měsíci +1

    Awesome! The best series I’ve seen in cybersecurity❤

  • @carol-lo
    @carol-lo Před rokem +6

    Hoping to have more lessons from Jeff. Especially related to emerging technology risk.

  • @KotiReddyaluri
    @KotiReddyaluri Před 4 měsíci +1

    Excellent Series. 🙏🙏🙏Thank you for the videos.

  • @srivasala4080
    @srivasala4080 Před rokem +6

    maybe my bad. I was developer in a security product company for 15 yrs and could never learn to such a level of extent and detail on all the products, reasonings, what-why-how and contextualities, well stitched together. Thanks again Jeff.
    At the end of the series, if you can light up the direction to proceed in the path towards continous learning, in this area, I will be greatful.

  • @jasgarcha4783
    @jasgarcha4783 Před rokem +3

    Another great video in the series Jeff. Thank you 👍❤.

    • @jeffcrume
      @jeffcrume Před rokem

      Thanks so much for saying so!

  • @jann9507
    @jann9507 Před 4 měsíci +2

    This was fantastic!
    The presenter did not try to push a vendor specific product or soft sell anything. Kudos !

    • @jeffcrume
      @jeffcrume Před 4 měsíci +1

      Not easy for a guy that works in software sales but thank you for noticing!

  • @IngleseAngel
    @IngleseAngel Před 10 měsíci +2

    difficult to pronounce SIEM and Jeff told me to call it whatever I like, therefore namining it Jonathan :)

    • @jeffcrume
      @jeffcrume Před 10 měsíci +2

      “Jonathan” is a much better name! 😂

  • @velo1337
    @velo1337 Před rokem +2

    thx for educating us, hope for more courses

  • @theintjengineer
    @theintjengineer Před rokem +6

    Jeff, I already commented on LinkedIn saying I wish you'd extend the series with more 100 videos, but just one question: should that not be possible, could you please start another series?😅
    Thank you very much!
    Greetings from Germany.
    #bestinstructor

    • @53darkknight53
      @53darkknight53 Před 8 měsíci

      I recommend IBM Cybersecurity Analyst course in Coursera, it's not this high quality but much more detailed on every subject + you get a certificate. You can also check google's Cybersecurity course in the same place which is very similar but better on quality and more recent

  • @Pem7
    @Pem7 Před 4 měsíci +1

    Love it 🤞🏾

  • @CharlieDuckQuack
    @CharlieDuckQuack Před 3 měsíci +1

    This is brilliant. Thanks Jeff and a quick query: How do I start building my skillset in SIEM as a novice?

    • @jeffcrume
      @jeffcrume Před 2 měsíci +1

      Glad you liked it. There’s really no substitute for hands-on training/experience. There are a number of courses that teach these skills including a deeper dive from Coursera

  • @DearSX
    @DearSX Před 5 měsíci +1

    Loving this series, thank you!

  • @shamielbhikha4756
    @shamielbhikha4756 Před rokem +2

    This is awesome

  • @emc3000
    @emc3000 Před rokem +3

    Ooooof 200 days is nuts.

  • @user-nu7vm8vb4y
    @user-nu7vm8vb4y Před 5 měsíci +1

    This might be a dumb question but would NDR be used here as well?

    • @jeffcrume
      @jeffcrume Před 5 měsíci +1

      Definitely. It could also be considered part of network security so it just depends on where you want to cover it. Same for EDR.

  • @tyrojames9937
    @tyrojames9937 Před rokem +2

    😎👍🏾

  • @user-gd4wt6oi7y
    @user-gd4wt6oi7y Před 3 měsíci

    I am hooked on to tech no doubt about that, it's that adversity thrust on my head that made my mind study it and turns out that it is not that vast only the brains writing those programs TOLD to write grasp that then in their own complicated language which is easy for them they create that program to be written, but first comes the creative idea what is the problem, without understanding the problem there can never be solutions, till today almost all systems got broken into, only now alarm so called systems got going yet alarm is machine can be silenced so? A program I swear would make even the most cunning crafty hacker chew his streaky chaddis joke coming up on this

  • @salonsospain
    @salonsospain Před měsícem

    960

  • @salonsospain
    @salonsospain Před měsícem

    709

  • @user-gd4wt6oi7y
    @user-gd4wt6oi7y Před 3 měsíci

    But those are for large organizations like govt or corporations companies, what about normal company consumers, are your packages for individuals coming equipped with security and I mean every gadget phones, pads,😊laptops, no of course not why not? It should have been done even if iOS operating systems bragged they are unhackable, they were broken through that means those firewalls are operating systems cannot safe guard, now in this realm most secure firewall system can be written, and installed which hacker will chew his/ her chaddis trying to break it, and I do have idea how it can be, how that particular programs of safety written then sold worldwide😊
    For once and all that program sold to all everyday use gadgets to consumer and every entry import of your streaming websites,every entry port of servers