温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.ibm.com/think/security
点击访问原文链接

Security | IBM

HomeThinkAI security What is adversarial machine learning? David ZaxMultifactor authentication What is adaptive multifactor authentication (adaptive MFA)? Bryan ClarkSecurity automation What is security automation? Derek Robertson, Annie BadmanData security What is bring your own key (BYOK)? Matthew Kosinski, Gregg LindemulderData privacy Data privacy guide to AI and machine learning While data privacy in general has long been a concern, the term “AI data privacy” acknowledges that the emerging technology of artificial intelligence brings with it new risks and privacy concerns.   David ZaxSecurity intelligence Episode 11Become an expert on fundamental and emerging cybersecurity topicsData securityCybersecurityRansomwareCyberattacksE-Book AI for Business: Maximize AI ROI through smarter governance Discover the key benefits gained with automated AI governance for any AI - apps, models or agents and how to maximize the ROI for all your AI initiatives with the right set of frameworks and toolsE-Book Data governance for data leaders This E-Book analyzes several topics related to data governance and privacy such as scalability, establishing and implementing organization-wide standards, and data lineage and traceability.E-Book How to choose the right AI foundation model Follow a simple 5 step performance framework and find out how to make smarter, safer AI model choices.E-Book AI that people trust is AI that people use Read this guide to better understand why AI is making security and governance matter more than ever and what are the barriers protecting and building trust for data and AI.Forrester Wave Prioritize your AI governance See why Forrester recognized IBM as a Leader for its watsonx.governance solution—helping enterprises manage AI risk, compliance, and trust at scale.Gartner TRiSM framework Build trust into every AI decision Gartner Market Guide for AI TRiSM outlines emerging solutions for AI trust, risk and security management to help organizations govern AI systems and manage associated risks.IDC report Unified AI Governance Enterprises looking to scale AI initiatives responsibly will require a strong AI governance platform. Read the full analysis and discover how IBM watsonx.governance can support your Al strategy.Cost of a Data Breach Close the AI oversight gap The 20th annual Cost of a Data Breach Report focuses on the promise and peril of AI, which is increasingly becoming a powerful tool for cyber criminals and our best defense against them.On-demand | Webinar Securing AI in 2026 — Approach for a Trustworthy and Resilient AI Future Join IBM and Wipro for an exclusive webinar exploring the evolving landscape of AI security — from emerging risks to proven frameworks that empower CISOs to lead confidently in this new era.On-demand | Webinar Critical Elements of AI Trust As organizations race to embrace AI for competitive advantage, they often overlook the core element of Trustworthy AI. The future of AI depends on how well we secure it today.On-demand | Webinar Securing AI Agents — Building Trust in the Era of Autonomous Systems Listen to IBM experts as we unpack real-world attack vectors, emerging frameworks, and actionable defense strategies for securing AI agents in enterprise environments.On-demand | Webinar Scale your AI securely Is your company struggling with siloed teams with their own set of tools and metrics, leading to duplicated efforts and missed opportunities? Find out how your security and governance teams can operate in sync.Banco do Brasil Trust by design Embedding Governance into AI at Banco do BrasilFerrari A new digital destination Engineering Scuderia Ferrari HP’s fan engagement strategyUS Open Building a smarter business from the ground up World-class digital experiences for more than 14 million fans around the globeUFC AI-generated narratives UFC partners with IBM to streamline and scale insight generation for 40+ live eventsReport Cost of a Data Breach Report 2025X-Force Cyber Frontlines: Mark HughesPodcast | AI in Action AI to defend against AI-based cybersecurity threatsX-Force Cyberattack magnet? Unyielding threats plague the industrial sectorOn-demand webinar Manage risk in AI deployments: Deep-dive into OWASP Top 10 for LLMReport IBM X-Force 2025 Threat Intelligence IndexX-Force In the protobuf: Web browser artifacts using Google's data interchange formatOn-demand webinar Govern, secure and monitor AI in one unified experienceExplainer What is threat detection and response (TDR)?Explainer What is network security?Explainer What is web security?Subscribe todayThreat managementVulnerability assessmentThreat intelligenceDiscover more in X-ForceThreat management Hive0154 drops Toneshell and SnakeDisk Hive0154 wreaks havoc on Singapore and Thailand using a new Toneshell backdoor and SnakeDisk USB worm. Learn MoreAdversary simulation Cyber Frontlines: Dustin HeywoodThreat intelligence QuirkyLoader: A new malware loader delivering infostealers and RATs Raymond Joseph AlfonsoSecurity What being a cop taught me about stopping hackers Ryan AnschutzThreat management Dissecting the CastleBot malware-as-a-service operation Golo MührThreat intelligence Weaponizing reality: The evolution of deepfake technology Alexis ObengAdversary simulation A look at the 'resource_prefetch_predictor_origin' table in Chromium browsers Jairo HibalerNews 2025 Cost of a Data Breach Report: Navigating the AI rush without sidelining security Limor KessemWatch the latest episode7 January 2026 | Episode 15 A new take on bug bounties, AI red teams and our New Year's resolutions29 December 2025 | Interview 3 Why it costs so much to get hacked in America23 December 2025 | Episode 14 Cybersecurity's year in review: ClickFix attacks, vibecoding vulnerabilities, shadow agents and more17 December 2025 | Episode 13 AI browser bans and the top software flaws of 202510 December 2025 | Episode 12 React2Shell makes waves, WormGPT falls flat and the latest threat to your Gmail account3 December 2025 | Episode 11 Your house might be a botnet, your devs are leaking secrets and poems are breaking your AI guardrails28 November 2025 | Interview 2 Trawling the honeypot: What it's like to discover a new malware strain26 November 2025 | Episode 10 The dark web job market thrives, AI fraud rings rise and it's holiday scam season19 November 2025 | Episode 9 Anthropic stops AI spies, the new OWASP Top 10 and the rise of small-time ransomware12 November 2025 | Episode 8 AI slop in cybersecurity, OT security fails and lessons from the Louvre heist5 November 2025 | Episode 7 Android malware that acts like a person and AI agents that act like malware31 October 2025 | Interview 1 How to break into an office: A social engineering expert talks physical security28 October 2025 | Episode 6 Is ChatGPT Atlas safe? Plus: Invisible worms, ghost networks and the AWS outage8 October 2025 | Episode 5 RIP Windows 10, automated code repair and battling the payroll pirates1 October 2025 | Episode 4 How to scam an AI agent, DDoS attack trends and busting cybersecurity mythsView the cloud security playlistAI in cybersecurity Learn how AI acts as a force multiplier to help you address security threats more effectively.What is SOAR? In this video, Jeff "The Security Guy" explains the need to have a strategy and the right tools for handling security incidents, including so-called "black swan" events.Phishing Explained Security expert Jeff Crume explains the attackers' strategy, whether it's phishing, spearfishing or whaling—and how to avoid falling for their traps.The power of AI: Security Security AI and automation technologies enable organizations to stay ahead of cyberthreats through faster incident detection and response.

智能索引记录