Sidebar

IBM Cloud Pak for Security is a platform that helps you uncover hidden threats, make more informed risk-based decisions and prioritize your team’s time. You can connect to your existing data sources to generate deeper insights, securely access IBM and third-party tools to search for threats across any cloud or on-premises location, and quickly orchestrate actions and responses to those threats – all while leaving your data where it is. See Cloud Pak for Security in action with this demo.

Identify and fix source code vulnerabilities with Code Risk Analyzer, a component of IBM Cloud Continuous Delivery. Watch this video to see a detailed overview of how you can scan your Node.js app in a Git repository before deployment to your Kubernetes cluster on the IBM Cloud.

Learn more at https://www.ibm.com/cloud/continuous-delivery

Build smart. Build secure. Join a global community of developers at http://ibm.biz/IBMdeveloperYT

Data security and protection are by far the biggest inhibitors for organizations seeking to move sensitive applications and data to the public cloud.  In fact, 95% of our customers in regulated industries cited security, privacy, regulatory concerns and cloud providers having backdoor access to organizations sensitive data  as their main inhibitors for using a public cloud.

In this video, Vivek Kinra with IBM Cloud, explains how Confidential Computing solutions provided IBM Cloud Hyper Protect Services are addressing these concerns.

Learn more about Functions as a Service → http://ibm.biz/learn-faas-guide​

Learn more about Serverless → http://ibm.biz/guide-to-serverless​

Check out the "What is Serverless?" lightboard video → https://youtu.be/vxJobGtqKVM​

Check out IBM Cloud Functions → http://ibm.biz/get-started-ibm-cloud-...

► Earn a badge with FREE interactive Kubernetes labs → http://ibm.biz/free-interactive-k8s-t...

What is Functions as a Service (FaaS), and how is it related to Serverless?

In this lightboard video, Jason Goode with IBM Cloud, explains how cloud computing has evolved over the years from Infrastructure as a Service (IaaS) to this new event-driven compute paradigm, the differences between both Serverless and FaaS, and then walks through a FaaS use case example for an eCommerce storefront.

Get started on IBM Cloud at no cost → http://ibm.biz/try-ibm-cloud-free-tier​

Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now​ 

What benefits does artificial intelligence (AI) present for cybersecurity? AI’s capability to analyze massive quantities of data with lightning speed means security threats can be detected in real time, or even predicted based on risk modeling.

As AI reaches new frontiers, there must be a framework for ensuring AI is accurate and ethical. Sridhar Muppidi, IBM Security CTO, offers insights into IBM Security’s approach to making AI integral to cybersecurity.

Learn more about AI and cybersecurity:  https://www.ibm.com/security/artificial-intelligence

Join this livestream featuring perspectives from both Z and Power IBM Champions on Open Source. They'll discuss the benefits of combining open source with these platforms and why this is vital to the future. They'll also discuss how they implement and support open source projects with IBM Z and Power systems. Bring your questions!

Join a global community of developers at http://ibm.biz/IBMdeveloperYT

Six IBM developers and developer advocates predict six trends to watch for in 2021.

These include:

  • Multi-architecture Development
  • Thin Terminal Developer Experience
  • Data Privacy in Security
  • Chatbots
  • Edge Computing
  • DevOps

Speakers include:

  • Spencer Krum IBM Developer Advocate
  • JJ Asghar IBM Developer
  • Advocate Megan Kostick IBM Sr. Software Engineer
  • Hana Ibrahim IBM Developer Advocate
  • Mo Haghighi IBM Developer Advocate
  • Luke Schantz IBM Developer Advocate

Build smart. Build secure. Join a global community of developers at http://ibm.biz/IBMdeveloperYT

 

 

Hybrid cloud is one of the most common architectural patterns out there which is used by a growing number of enterprises. However, it’s often a result of companies that are unable to abandon their existing technology stack in favor of the public cloud.

What if I told you that there is way you could get the best of both worlds?

In this video, Sai Vennam with IBM Cloud explains how this feat can be accomplished with Distributed Cloud, as well as some common use cases where enterprises can benefit from this new cloud computing architecture.

Get started on IBM Cloud at no cost: http://ibm.biz/start-lite-cloud-account

Welcome back to the fifth episode of IBM Cloud Now, a bi-weekly series bringing you the latest and greatest IBM Cloud news and announcements. Make sure to check out the IBM Cloud Blog for a full rundown of all announcements: http://ibm.biz/cloud-blog-announcements

Get started on IBM Cloud for free: http://ibm.biz/no-cost-cloud-account

How can you ensure that your data is stored consistently and reliably across a distributed system? In this lightboard video, Whitney Lee with IBM Cloud breaks down how etcd, an open-source distributed key-value store, can reliably hold and manage your critical information that needs to be accessed by a distributed system or cluster of machines.

Get started on IBM Cloud at no cost:http://ibm.biz/start-ibm-cloud-for-free

Welcome back to the fourth episode of IBM Cloud Now, a bi-weekly series bringing you the latest and greatest IBM Cloud news and announcements!

In light of current events, Sai Vennam is coming to you from a studio we built in his home, and he's focusing on some no-cost offers from IBM to help organizations maintain business continuity and productivity in remote work environments:

Make sure to check out the IBM Cloud Blog for a full rundown of all announcements:http://ibm.biz/cloud-blog-announcements

Get started on IBM Cloud for free: http://ibm.biz/no-cost-ibm-cloud-account

A DDoS attack is an attempt by an attacker to create so much traffic or congestion to a target application, or an internet application that It impedes the traffic flow of normal visitors. Check out this quick overview video with Ryan Sumner as he goes over the basics of a DDoS attack and what to look for if you think you may be under attack.

Learn more about IBM Cloud Internet Services: https://www.ibm.com/us-en/?ar=1

Learn more about DDoS: https://www.ibm.com/cloud/learn/networking-a-complete-guide

Get started for free on IBM Cloud: https://www.ibm.com/cloud/free

LATEST COMMENTS

Support MC Press Online