Security Risks for Networks, Mainframes & beyond, with Beta Systems

Channel:
Subscribers:
73,500
Published on ● Video Link: https://www.youtube.com/watch?v=tEBwD8_LtqE



Duration: 43:17
159 views
5


Do we really know how many devices are connected to our network? How can we validate all connected devices are authorized and secure?

Passwords & Authentication: So simple yet often taken for granted. Have we implemented best practices when authenticating users to our Mainframe system and beyond?
Working Remotely: Remote work brings many challenges for organizations. Ensuring our workforce has the access they need to perform quality work while maintaining a secure corporate Network and Mainframe environment is critical.

Public Wi-Fi: More remote workers and less time in the office means corporate devices and applications will be exposed to more Public networks. Is our Mainframe data still safe? Is our internal Network able to detect a threat immediately?

Social Engineering & Social Media: Many of us know about common Phishing scams, however, Social Engineering and our Social habits online pose a much bigger threat. Have we taken steps to close those not-so-easy-to-find Mainframe vulnerabilities?

Learn more about IBM Security for your Hybrid Cloud - https://developer.ibm.com/articles/introduction-to-ibm-cloud-pak-for-security/?mhsrc=ibmsearch_a&mhq=security
____________________________________________
Learn in-demand skills. Build with real code. Connect to a global development community: http://ibm.biz/IBMdeveloperYT

Subscribe to see more developer content → https://www.youtube.com/user/developerworks?sub_confirmation=1

Follow IBM Developer on social:
Twitter: https://twitter.com/IBMDeveloper
Facebook: https://www.facebook.com/IBMDeveloper/
LinkedIn: https://www.linkedin.com/showcase/ibmdeveloper

More from IBM Developer:
Community: https://developer.ibm.com/community/
Blog: https://developer.ibm.com/blogs/
Call for Code: https://developer.ibm.com/callforcode/

#IBMDeveloper
#Developer
#Coding




Other Videos By IBM Developer


2022-05-11IBM Champions Roundtable at Think Broadcast Day 2
2022-05-10IBM Champions Roundtable at Think Broadcast
2022-05-05Let's Code: Delivering a Secure Software Supply Chain (Part 1)
2022-05-05IBM-Z: Identify & Key Management, Secure and Easy in a Hybrid Cloud with Empalis
2022-05-04Let's Code: Containerized AI for edge computing
2022-04-28IBM zSystems: Explore database security - Software AG
2022-04-21Exploring the regression optimization API on IBM API Hub
2022-04-21Let's Code: Exploring the regression optimization API on IBM API Hub
2022-04-21Audit Handling in Finance & Insurance with Software Engineering GmbH
2022-04-14Let's Code: Deep dive into the Distributed AI SDK deployed on API Hub
2022-04-07Security Risks for Networks, Mainframes & beyond, with Beta Systems
2022-04-01IBM Edge Application Manager Deployment: Patterns and Policies
2022-04-01Everything you want to know about IBM Edge Application Manager
2022-03-31Let's Code: Leveraging IBM API Hub for application success
2022-03-25Rama Akkiraju - In the Open with Luke and Joe
2022-03-24Secure your systems with our ecosystem
2022-03-23Natural language processing in tech for good applications
2022-03-17Introducing the IBM Edge Application Manager playlist
2022-03-17Let's Code: IBM Developer Technology Sandbox helps you adopt technology faster
2022-03-11Jamie Thomas | OpenSSF Board Chair and General Manager, Systems Strategy and Development, IBM
2022-03-10Let's Code: Exploratory data analysis for all with open-source Voyager2 on Code Engine