Cybersecurity Architecture: Detection
ฝัง
- เผยแพร่เมื่อ 15 พ.ย. 2024
- IBM Security QRadar EDR : ibm.biz/BdyQeU
IBM Security X-Force Threat Intelligence Index 2023: ibm.biz/BdyQbx
Security is about prevention, detection, and response. In this installment, IBM Distinguished Engineer and adjunct professor Jeff Crume explains the tools that are key to detecting an attack as soon as possible. He also clarifies the often-confused distinction between SIEM and XDR systems by delving into their historical usage, noting they're not either/or choices, but complementary tools that experienced cybersecurity analysts use with the help of federated search capabilities.
Get started for free on IBM Cloud → ibm.biz/ibm-cl...
Subscribe to see more videos like this in the future → ibm.biz/subscri...
#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #detection
I can imagine this series becoming a classic. Absolutely great content!
Thanks so much!
If I could hit the like button 1 million times I would do it, the content is extraordinary, words are not enough to thank you.
Big thanks IBM
Wow, thank you!
@melbouananimelbouanani7561 thanks so much for the enthusiastic complements!!!
Thank you to Jeff and the IBM Team. These videos helped me so much in preparing for interview questions i've been asked. Jeff's students in-person are lucky to be able to learn from such a brilliant and passionate mind in this field.
You are so very kind to say so!
Jeff you are too much. Pls we need more series on deferent areas. Thanks once again. Greetings from Africa Nigeria
So educative with clarity of expression.
SIEM and XDR was excellent concept, Thanks for your videos
You’re very welcome!
I have been following this series from no 1 thanks for making this videos
Thanks so much for continuing to watch!
maybe my bad. I was developer in a security product company for 15 yrs and could never learn to such a level of extent and detail on all the products, reasonings, what-why-how and contextualities, well stitched together. Thanks again Jeff.
At the end of the series, if you can light up the direction to proceed in the path towards continous learning, in this area, I will be greatful.
Excellent Series. 🙏🙏🙏Thank you for the videos.
Thanks for watching!
I've been liking comments so far because there are already so many comments that mention just how awesome this series is. Now, I've absolutely gotta drop mine. Thank you so much for this series (@ Jeff and IBM). I love how it puts everything into perspective; it's helped me see how topics I previously touched on in isolation fit into the larger security picture. I will come back to rewatch the entire series in a few months.
I’m so glad to hear that you enjoyed it!
Hoping to have more lessons from Jeff. Especially related to emerging technology risk.
Wow that was a mouthful of security. Nice!
Another great video in the series Jeff. Thank you 👍❤.
Thanks so much for saying so!
Jeff, I already commented on LinkedIn saying I wish you'd extend the series with more 100 videos, but just one question: should that not be possible, could you please start another series?😅
Thank you very much!
Greetings from Germany.
#bestinstructor
I recommend IBM Cybersecurity Analyst course in Coursera, it's not this high quality but much more detailed on every subject + you get a certificate. You can also check google's Cybersecurity course in the same place which is very similar but better on quality and more recent
This was fantastic!
The presenter did not try to push a vendor specific product or soft sell anything. Kudos !
Not easy for a guy that works in software sales but thank you for noticing!
difficult to pronounce SIEM and Jeff told me to call it whatever I like, therefore namining it Jonathan :)
“Jonathan” is a much better name! 😂
Awesome! The best series I’ve seen in cybersecurity❤
Thanks so much!
Very powerful
thx for educating us, hope for more courses
Loving this series, thank you!
Thanks for watching!
This is brilliant. Thanks Jeff and a quick query: How do I start building my skillset in SIEM as a novice?
Glad you liked it. There’s really no substitute for hands-on training/experience. There are a number of courses that teach these skills including a deeper dive from Coursera
This is awesome
Ooooof 200 days is nuts.
Love it 🤞🏾
This might be a dumb question but would NDR be used here as well?
Definitely. It could also be considered part of network security so it just depends on where you want to cover it. Same for EDR.
NDR logs to the SIEM
😎👍🏾
I am hooked on to tech no doubt about that, it's that adversity thrust on my head that made my mind study it and turns out that it is not that vast only the brains writing those programs TOLD to write grasp that then in their own complicated language which is easy for them they create that program to be written, but first comes the creative idea what is the problem, without understanding the problem there can never be solutions, till today almost all systems got broken into, only now alarm so called systems got going yet alarm is machine can be silenced so? A program I swear would make even the most cunning crafty hacker chew his streaky chaddis joke coming up on this
960
But those are for large organizations like govt or corporations companies, what about normal company consumers, are your packages for individuals coming equipped with security and I mean every gadget phones, pads,😊laptops, no of course not why not? It should have been done even if iOS operating systems bragged they are unhackable, they were broken through that means those firewalls are operating systems cannot safe guard, now in this realm most secure firewall system can be written, and installed which hacker will chew his/ her chaddis trying to break it, and I do have idea how it can be, how that particular programs of safety written then sold worldwide😊
For once and all that program sold to all everyday use gadgets to consumer and every entry import of your streaming websites,every entry port of servers
709