Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
About
No channel description available.
Latest Posts
Video Description
IBM Security QRadar EDR : https://ibm.biz/Bdyd7k IBM Security X-Force Threat Intelligence Index 2023: https://ibm.biz/Bdyd76 This ten part video series is based on a 400 level class on Enterprise Cybersecurity Architecture taught by Jeff "the Security Guy" Crume at a local university. He'll begin by explaining the foundational principles of cybersecurity - five that are best practices and one that's just the opposite. The subsequent episodes will look at the various domains that apply to a well-designed security architecture. Be sure to subscribe so you'll get notified of the next video! Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now #AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #ibm Chapters 00:00 Principles Introduction 01:05 Defense in Depth 04:20 Least Privilege 07:55 Separation of Duties 09:50 Secure by Design 12:15 Keep It Simple, Stupid (KISS) 14:43 Security by Obscurity
Secure Your Network: Expert Tools
AI-recommended products based on this video

TP-Link Omada AC1750 Gigabit Wireless Access Point (EAP245 V3) - Business WiFi Solution w/Mesh Support, Seamless Roaming & MU-MIMO, PoE Powered, SDN Integrated, Cloud Access & Omada App, White

GL.iNet GL-SFT1200 (Opal) Secure Travel WiFi Router – AC1200 Dual Band Gigabit Ethernet Wireless Internet | IPv6 USB 2.0 MU-MIMO DDR3 |128MB Ram Repeater Bridge Access Point Mode

Tenda AC1200 WiFi Router, Dual Band Wireless Router 4 x 100 Mbps Ethernet Ports, Supports APP, Guest WiFi, Access Point Mode, IPv6, Parental Control(AC6)




















