Tag: IBM

Incident Enrichment | IBM Resilient

https://vimeo.com/309472599/5b374bf47e Cyber analyst have to deal with massive mountains of work and alerts. Watch as Jessica Cholerton talks you through what all of these different...

Automation In Incident Response | IBM Resilient

https://vimeo.com/309472799/36f3c151fb Jessica Cholerton joined us in the studio to speak to us about automation in incident response and the different areas that you could and should...

Mitre attack | IBM Resilient

https://vimeo.com/310593996/7a2405893c A Mitre Attack framework is a way to map the techniques used by an attacker. Craig Roberts joined us in the studio to talk...

Breaking Out Workflows part 1 & 2 | IBM Resilient

https://vimeo.com/310595628/92c196cfbf Watch as Craig Roberts discusses how they map out an incident response process and the best way to start thinking about designing such a...

Threat Intelligence Platform | IBM Resilient

https://vimeo.com/310622492/2c575e887e Craig Roberts discusses how threat intelligence platforms and security orchestration automation platforms interact with each other and draws this out in an easy to...

Role Based Access Control (RBAC) | IBM Resilient

https://vimeo.com/315656601/91ac0f2c67 Role Based Access Control is critical in maintaining privacy and security over the investigation of incidents. An incident response system needs to maintain privacy...
spot_imgspot_img

Popular articles

A Business Continuity Cheat Sheet

Right, let's be honest. When you hear "business continuity,"...

Challenges of Cloud & Ultima’s Solution to Transform Business

With the way that AWS and Microsoft dominate technology...

Data privacy concerns linger around LLMs training

We have all witnessed the accelerated capabilities of Large...

Securing Benefits Administration to Protect Your Business Data

Managing sensitive company information is a growing challenge. Multiple...

Which Cloud Type Suits You – Public, Private, Hybrid?

Valuable lessons have been learnt about cloud deployments over...