Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

By IBM Technology

Community Score: 50% | 918.8K views | 2y

0 community ratings: null thumbs up, null thumbs down

IBM Security QRadar EDR : https://ibm.biz/Bdyd7k IBM Security X-Force Threat Intelligence Index 2023: https://ibm.biz/Bdyd76 This ten part video series is based on a 400 level class on Enterprise Cybersecurity Architecture taught by Jeff "the Security Guy" Crume at a local university. He'll begin by explaining the foundational principles of cybersecurity - five that are best practices and one that's just the opposite. The subsequent episodes will look at the various domains that apply to a well-designed security architecture. Be sure to subscribe so you'll get notified of the next video! Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now #AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #ibm Chapters 00:00 Principles Introduction 01:05 Defense in Depth 04:20 Least Privilege 07:55 Separation of Duties 09:50 Secure by Design 12:15 Keep It Simple, Stupid (KISS) 14:

Tags: security, cybersecurity, cyber security, it security, edr, endpoint detection and response, xdr, kiss, keep it simple stupid, least privilege, defense in depth

Communities

  • Science & Tech — 0 upvotes, 0 comments

More from IBM Technology

  • What is Multimodal RAG? Unlocking LLMs with Vector Databases — Score: 50%
  • AI Privilege Escalation: Agentic Identity & Prompt Injection Risks — Score: 50%
  • Better Instructions, Better AI Results — Score: 50%
  • Copilot usage reveals AI adoption patterns — Score: 50%
  • Claude Opus 4.6 Security Risks — Score: 50%
  • What is OpenRAG? Unlocking the Future of RAG in Generative AI — Score: 50%