No video

Security vs. Privacy

  Рет қаралды 6,822

IBM Technology

IBM Technology

28 күн бұрын

Read the Cost of a Data Breach report → ibm.biz/BdK4GL
Learn more about the security with IBM → ibm.biz/BdK4G9
If you're not paying, you're likely the product. In this video, Jeff Crume explains that statement as well as the impact on user privacy and data security, and how organizations manage these concerns. Discover the importance of informed consent, transparency, and regulatory compliance in safeguarding personal information - and the critical distinctions, and relationship, between security and privacy in digital services.
Sign up for a monthly newsletter: Security updates from IBM → ibm.biz/BdK4GC

Пікірлер: 22
@RainMan52
@RainMan52 27 күн бұрын
Even when you pay full price for it, you're the product.
@jeffcrume
@jeffcrume 27 күн бұрын
Certainly that is a possibility but not every company operates that way
@narcisopena5251
@narcisopena5251 16 күн бұрын
Great explanation! Thanks Jeff.
@mullla1ya
@mullla1ya 25 күн бұрын
You got me thinking about work, wage, taxes, and who pays whom. Am I a product at my work and a customer in the state? 🤔
@jeffcrume
@jeffcrume 17 күн бұрын
Good questions!
@ettoreatalan8303
@ettoreatalan8303 24 күн бұрын
5:25 GDPR is the acronym for “*General* Data Protection Regulation”.
@CountdownIdiomas
@CountdownIdiomas 25 күн бұрын
I liked a lot the board you wrote to explain. Is it IBM tech board to provide classes?
@jeffcrume
@jeffcrume 17 күн бұрын
Glad you liked it. Yes, we have lots of light board videos on the IBM Technology channel. If you want to know how we make these, search for “how we make them” on this channel
@GrayCatPI
@GrayCatPI 25 күн бұрын
Great insights on the balance between security and privacy. How can organizations better educate their users about informed consent and the importance of data security?
@jeffcrume
@jeffcrume 17 күн бұрын
Glad you liked it. I teach a course at the university level that deals with these issues. Not always simple or straightforward but making people aware of what can and is being done with their data is a start
@GrayCatPI
@GrayCatPI 15 күн бұрын
@@jeffcrume Is it available for the public?
@0xdolan
@0xdolan 22 күн бұрын
🔥
@ravbhuva
@ravbhuva 26 күн бұрын
I believe "ISO 27000/ISO 27001" Security Side right?
@jeffcrume
@jeffcrume 26 күн бұрын
Yes, privacy is addressed by other standards
@dofilamingo8848
@dofilamingo8848 26 күн бұрын
I like your videos a lot
@jeffcrume
@jeffcrume 17 күн бұрын
Thanks so much!
@carsonjamesiv2512
@carsonjamesiv2512 25 күн бұрын
😃👍
@chancymzama7478
@chancymzama7478 26 күн бұрын
nice
@randompurposepurpose3047
@randompurposepurpose3047 27 күн бұрын
Do something about ai taking the jobs
@TOMESHTI
@TOMESHTI 22 күн бұрын
Study
Passwordless Authentication: Weighing the Options
11:41
IBM Technology
Рет қаралды 17 М.
Difference Between MPLS and Internet: Explained
6:06
Network Kings
Рет қаралды 9 М.
ПРОВЕРИЛ АРБУЗЫ #shorts
00:34
Паша Осадчий
Рет қаралды 7 МЛН
Как бесплатно замутить iphone 15 pro max
00:59
ЖЕЛЕЗНЫЙ КОРОЛЬ
Рет қаралды 8 МЛН
IQ Level: 10000
00:10
Younes Zarou
Рет қаралды 12 МЛН
ТЫ С ДРУГОМ В ДЕТСТВЕ😂#shorts
01:00
BATEK_OFFICIAL
Рет қаралды 6 МЛН
What is a Zero Day Threat?
13:45
IBM Technology
Рет қаралды 12 М.
Data protection explained in three minutes
2:54
Information Commissioner's Office (ICO)
Рет қаралды 39 М.
Privacy vs. Security in the Age of Digital Surveillance | Digits
7:40
Curiosity Stream
Рет қаралды 11 М.
Generative AI in a Nutshell - how to survive and thrive in the age of AI
17:57
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
IBM Technology
Рет қаралды 112 М.
MPLS L3 VPNs in a Nutshell
8:29
Keith Barker - The OG of IT
Рет қаралды 451 М.
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
Sustainable Business Summit Singapore |  Session 1
3:32:32
Bloomberg Live
Рет қаралды 4,5 М.
Understanding Neural Networks and AI
9:21
IBM Technology
Рет қаралды 14 М.
ПРОВЕРИЛ АРБУЗЫ #shorts
00:34
Паша Осадчий
Рет қаралды 7 МЛН