温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.ibm.com/think/security
点击访问原文链接

Security | IBM

HomeThinkAI security What is adversarial machine learning? David ZaxMultifactor authentication What is adaptive multifactor authentication (adaptive MFA)? Bryan ClarkSecurity automation What is security automation? Derek Robertson, Annie BadmanData security What is bring your own key (BYOK)? Matthew Kosinski, Gregg LindemulderAI governance Agentic AI governance—Playbook Gartner, and even reports from firms like McKinsey, predict that by 2027, over 40% of agentic artificial intelligence initiatives, driven by generative AI agents, LLMs and other agentic AI systems will fail. The failure can come due to high costs, unclear value and weak risk controls, underscoring the need for robust agentic AI governance.  Shalini HarkarConsulting - Cybersecurity - DEPRECATED X-Force Threat Intelligence Index 20262026 Buyer's guide report | Smarter AI Governance and security solutionsData securityCybersecurityRansomwareCyberattacksExplore IBM GuardiumExplore watsonx.governanceExplore IBM VerifyExplore IBM HashicorpExplore MaaS360Discover IBM Guardium Data ProtectionLearn moreLearn moreLearn moreLearn moreEbook AI for business: Maximize AI ROI through smarter governance Discover the key benefits gained with automated AI governance for any AI—apps, models or agents. Learn how to maximize the ROI for all your AI initiatives with the right set of frameworks and tools.Ebook Data governance for data leaders This ebook analyzes several topics related to data governance and privacy such as scalability, establishing and implementing organization-wide standards and data lineage and traceability.Ebook How to choose the right AI foundation model Follow a simple 5-step performance framework and find out how to make smarter, safer AI model choices.Ebook AI that people trust is AI that people use Read this guide to better understand why AI is making security and governance matter more than ever and what are the barriers to protecting and building trust for data and AI.Forrester Wave Prioritize your AI governance See why Forrester recognized IBM as a leader for its watsonx.governance solution—helping enterprises manage AI risk, compliance and trust at scale.Gartner TRiSM framework Build trust into every AI decision Gartner Market Guide for AI TRiSM outlines emerging solutions for AI trust, risk and security management to help organizations govern AI systems and manage associated risks.IDC report Unified AI governance Enterprises looking to scale AI initiatives responsibly will require a strong AI governance platform. Read the full analysis and discover how IBM watsonx.governance can support your Al strategy.Cost of a Data Breach Close the AI oversight gap The 20th annual Cost of a Data Breach Report focuses on the promise and peril of AI, which is becoming a powerful tool for cybercriminals and our best defense against them.On-demand | Webinar Securing AI in 2026—A trustworthy and resilient approach to the AI future Join IBM and Wipro for an exclusive webinar exploring the evolving landscape of AI security—from emerging risks to the frameworks that help CISOs lead with confidence in this new era.On-demand | Webinar Critical elements of AI trust As organizations race to embrace AI for competitive advantage, they often overlook the core element of trustworthy AI. The future of AI depends on how well we secure it today.On-demand | Webinar Securing AI agents—Building trust in the era of autonomous systems Listen to IBM experts as we unpack real-world attack vectors, emerging frameworks and actionable defense strategies for securing AI agents in enterprise environments.On-demand | Webinar Scale your AI securely Is your company struggling with siloed teams with their own set of tools and metrics, leading to duplicated efforts and missed opportunities? Find out how your security and governance teams can operate in sync.Banco do Brasil Trust by design Embedding governance into AI at Banco do Brasil.Ferrari A new digital destination Engineering Scuderia Ferrari HP’s fan engagement strategy.US Open Building a smarter business from the start World-class digital experiences for more than 14 million fans around the globe.UFC AI-generated narratives UFC collaborates with IBM to streamline and scale insight generation for 40+ live events.Watch the latest episode14 April 2026 | Episode 29 Claude Mythos: Marketing hype or the end of cybersecurity?8 April 2026 | Episode 28 The Claude Code source code leak: Takeaways for cybersecurity pros1 April 2026 | Episode 27 RSA recap, the LiteLLM breach and the quest to fix AI25 March 2026 | Episode 26 Promptware, cloud security trends for 2026 and what the Xbox One hack means for cybersecurity7 January 2026 | Episode 15 A new take on bug bounties, AI red teams and our New Year's resolutions29 December 2025 | Interview 3 Why it costs so much to get hacked in America23 December 2025 | Episode 14 Cybersecurity's year in review: ClickFix attacks, vibe coding vulnerabilities, shadow agents and more17 December 2025 | Episode 13 AI browser bans and the top software flaws of 202510 December 2025 | Episode 12 React2Shell makes waves, WormGPT falls flat and the latest threat to your Gmail account3 December 2025 | Episode 11 Your house might be a botnet, your devs are leaking secrets and poems are breaking your AI guardrails28 November 2025 | Interview 2 Trawling the honeypot: What it's like to discover a new malware strain26 November 2025 | Episode 10 The dark web job market thrives, AI fraud rings rise and its holiday scam season19 November 2025 | Episode 9 Anthropic stops AI spies, the new OWASP top 10 and the rise of small-time ransomware12 November 2025 | Episode 8 AI slop in cybersecurity, OT security fails and lessons from the Louvre heist5 November 2025 | Episode 7 Android malware that acts like a person and AI agents that act like malware31 October 2025 | Interview 1 How to break into an office: A social engineering expert talks physical security28 October 2025 | Episode 6 Is ChatGPT Atlas safe? Plus: Invisible worms, ghost networks and the AWS outage8 October 2025 | Episode 5 RIP Windows 10, automated code repair and battling the payroll pirates1 October 2025 | Episode 4 How to scam an AI agent, DDoS attack trends and busting cybersecurity mythsView the cloud security playlistAI in cybersecurity Learn how AI acts as a force multiplier to help you address security threats more effectively.What is SOAR? In this video, Jeff "The security guy" explains the need to have a strategy and the right tools for handling security incidents, including so-called "black swan" events.Phishing explained Security expert Jeff Crume explains the attackers' strategy, whether it's phishing, spearfishing or whaling—and how to avoid falling for their traps.The power of AI: Security Security AI and automation technologies enable organizations to stay ahead of cyberthreats through faster incident detection and response.

智能索引记录