Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
Community Score: 50% | 918.8K views | 2y
0 community ratings: null thumbs up, null thumbs down
IBM Security QRadar EDR : https://ibm.biz/Bdyd7k IBM Security X-Force Threat Intelligence Index 2023: https://ibm.biz/Bdyd76 This ten part video series is based on a 400 level class on Enterprise Cybersecurity Architecture taught by Jeff "the Security Guy" Crume at a local university. He'll begin by explaining the foundational principles of cybersecurity - five that are best practices and one that's just the opposite. The subsequent episodes will look at the various domains that apply to a well-designed security architecture. Be sure to subscribe so you'll get notified of the next video! Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now #AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #ibm Chapters 00:00 Principles Introduction 01:05 Defense in Depth 04:20 Least Privilege 07:55 Separation of Duties 09:50 Secure by Design 12:15 Keep It Simple, Stupid (KISS) 14:
Tags: security, cybersecurity, cyber security, it security, edr, endpoint detection and response, xdr, kiss, keep it simple stupid, least privilege, defense in depth
Communities
- Science & Tech — 0 upvotes, 0 comments
More from IBM Technology
- What is Multimodal RAG? Unlocking LLMs with Vector Databases — Score: 50%
- AI Privilege Escalation: Agentic Identity & Prompt Injection Risks — Score: 50%
- Better Instructions, Better AI Results — Score: 50%
- Copilot usage reveals AI adoption patterns — Score: 50%
- Claude Opus 4.6 Security Risks — Score: 50%
- What is OpenRAG? Unlocking the Future of RAG in Generative AI — Score: 50%