Security Intelligence Podcast

Cybersecurity Challenges Facing Telecommunications and Media Entertainment

Play
Play
Share!

Share this Podcast

MyCast

MyCast

MyCast Subscription

Security Intelligence Podcast

IBM Security

Description: Welcome to the Security Intelligence Podcast, whe…

Most Recent Post

Cybersecurity Challenges Facing Telecommunications and Media Entertainment

Play Download media
Telecom and media entertainment enterprises serve millions of customers and handle massive volumes of sensitive data. Unsurprisingly, these industries also face unique cybersecurity challenges. Klint Borozan, IBM worldwide security industry leader, joins this episode for a look at how telecom and media companies are handling growing security concerns while managing complex infrastructure, safeguarding valuable data and improving information security policies. Find more industry-focused podcasts at ibm.co/2NAY02M. And to discover how IBM Security provides fast, integrated and efficient solutions for your industry, visit ibm.co/2uML2nl.

Last 5 Posts

X-Force Red In Action 010: Spotlight on Phishing Awareness With Chris Sethi

Play Download media
Worried about phishing attacks this holiday season? Senior security consultant Chris Sethi joins this episode of our ongoing X-Force Red in Action series [ibm.co/2lUG2YQ] to discuss how companies like yours can promote phishing awareness to limit overall risk and protect critical data and assets...

Digital Identity Trust, Part 2: Security Without Sacrificing Customer Experience

Play Download media
How can enterprises deliver the frictionless experience customers demand without compromising security? This is one of the critical questions IBM Trusteer sales leader Shaked Vax takes on in part 2 of our digital identity trust podcast series (catch part 1 at https://ibm.co/2rmlNpz)...

Why the Promise of PowerShell is Not Without its Problems

Play Download media
PowerShell is powerful. The task scheduling and automation service is now used worldwide to simplify IT environments. What's problematic is that Powershell's open source nature makes it a powerful tool for threat actors as well...

Forrester Analyst Heidi Shey Dives Deep Into Data Discovery and Classification

Play Download media
If you're seeking an in-depth look into data discovery, classification and the future of corporate big data strategies, don't miss this podcast episode featuring Forrester data analyst Heidi Shey.

Listen now, and read the complete Forrester report, "Rethinking Data Discovery & Classification Strateg...

Incident Response 2020: Cyberthreat Training Goes Mobile with the X-Force Command C-TOC

Play Download media
Cyberattacks can happen anywhere and at any time. IBM Security recently made a giant leap toward leveling the playing field with its new Cyber Tactical Operations Center (C-TOC), a fully mobile cyberthreat training simulator modeled after the tactical and incident command centers used by the militar...

Guest Book

Subscribe & Follow