Cybersecurity Architecture: Data Security

Поделиться
HTML-код
  • Опубликовано: 14 янв 2025

Комментарии • 29

  • @kemsthegreat
    @kemsthegreat Год назад +15

    Jeff proves his Ph.D. well. He explained these topics in a way everyone can understand. Not dumbed down.

    • @jeffcrume
      @jeffcrume Год назад +1

      Thank you for the kind words!

  • @atocampoari8575
    @atocampoari8575 Год назад +8

    Ever since i took a course on cybersecurity by IBM...your ability to simplify complex and lengthy content is so smooth and easy to grasp....you are now my favourite teacher😎🔥

    • @jeffcrume
      @jeffcrume Год назад +2

      Very nice of you to say so! I’m really glad you are enjoying the videos!

  • @hunter5701
    @hunter5701 9 месяцев назад +3

    Love this whole series. I'm a senior consultant at a major cybersecurity company and this has given me a knowledge roadmap. Thank you so much.

    • @jeffcrume
      @jeffcrume 8 месяцев назад +1

      You’re very welcome!

  • @kent_calvin
    @kent_calvin Год назад +6

    My favourite teacher is back 🎉

    • @jeffcrume
      @jeffcrume Год назад

      Thanks so much for the kind words! 😊

  • @billyfoster3223
    @billyfoster3223 Год назад +3

    Great video series! This is helping me with my cybersecurity studies! Thanks!😁👍

    • @jeffcrume
      @jeffcrume Год назад

      As a teacher, I love hearing this!

  • @adeleyejaphet8334
    @adeleyejaphet8334 4 месяца назад +1

    Very much love to learn

  • @materubass
    @materubass Год назад +3

    Awesome video. When it comes to data protection one topic that is sometimes overlooked is encryption for data-in-use. There are technologies such as Redis that tend to put data in-memory (a place that is not always encrypted by default) which could be subject to memory dumps where sensitive data as well as encryption keys could be extracted from. Thankfully Intel and AMD have improved memory protection (TME and SME) in their latest processors families enabling encryption for data-in-use.

  • @gavbam
    @gavbam Год назад +1

    Kudos to the instructor, now only was the content engaging but kept to the content without going down the path of blowing his own trumpet on every topic. Thank you for the clear and concise information.

    • @jeffcrume
      @jeffcrume Год назад

      Thank you for the kind complements!

  • @pankaj16octdogra
    @pankaj16octdogra Год назад +1

    Nice presentation

  • @rafaelkss2009
    @rafaelkss2009 Год назад +1

    great series

  • @naridabanucio2828
    @naridabanucio2828 4 месяца назад +1

    I would suggest to create a similar series for Security Risk Governance and Management.

  • @srivasala4080
    @srivasala4080 Год назад +1

    Super👌

  • @tomahs9823
    @tomahs9823 Год назад +1

    Great Video!

  • @LutherDrucker
    @LutherDrucker 8 месяцев назад +1

    Love to learn these kind of architecture!!
    Also just got to know about a Irys which is world only provenance layer that is making buzz all around do you know about it !!

    • @jeffcrume
      @jeffcrume 6 месяцев назад

      Glad you liked it!

  • @Jerrauex
    @Jerrauex Год назад

    10:00 🗃️📚📝

  • @WilhelmPendragon
    @WilhelmPendragon 10 месяцев назад +1

    So if your company’s total value is below 4.35M, a data breach has already eliminated your company?

    • @jeffcrume
      @jeffcrume 10 месяцев назад

      Not likely. That’s the AVERAGE cost for ALL companies. Your situation can always vary

  • @RC19786
    @RC19786 11 месяцев назад +1

    frankly speaking, coming from an expericne in cybersec and passion for it, Data Security has to b one of the most boring aspects of it! 🙂

    • @jeffcrume
      @jeffcrume 10 месяцев назад +3

      … Yet one of the most critical 😊

  • @MalvinderKaur-e7x
    @MalvinderKaur-e7x 8 месяцев назад

    Everything fails before the first line of security which should come with all electronic tech gadgets and servers, now what are those? How should it be made that hackers even if they chew their hair to the end cannot, it is in the coding programming language creating firewalls and..... No. I am not telling till I do not get a good with my integrity partner... Hackers already have broken into set firewalls sold outside by buying them and hacking them, so are useless since ages,I have been so hassled in this arena my online life is blocked, funds meant for me eaten on the way. work stopped, result? It made me think of a new safety system fool proof and for all in their hands all well thought out and can be made. No.. no attack can breach those firewalls.

  • @karashevf
    @karashevf 5 месяцев назад

    447

  • @karashevf
    @karashevf 5 месяцев назад

    1K