Twitter | Search | |
Michael Ash
An IBMer with a passion for cognitive solutions, and cyber-security as it related to improving patient safety and outcomes. Tweets are my views only...
150
Tweets
64
Following
62
Followers
Tweets
Michael Ash Aug 1
Cloud migration best practices via expert Kevin Jackson Check out the full story here:
Reply Retweet Like
Michael Ash Jul 26
10 Key Findings From the Ponemon Institute Value of Artificial Intelligence in Cybersecurity Study
Reply Retweet Like
Michael Ash Jul 25
Quantum Leaps and Bounds: Why Quantum Computing Will Have a Positive Impact on Cybersecurity
Reply Retweet Like
Michael Ash Jul 23
New NIST Guidebook Says Cybersecurity Is Everyone’s Job — Here’s Why
Reply Retweet Like
Michael Ash Jul 10
Best Strategy to Manage Application Security Risk
Reply Retweet Like
Michael Ash Jun 22
Fight Fire With Fire: How AI Plays a Role in Both Stopping and Committing DDoS Attacks
Reply Retweet Like
Michael Ash Jun 21
Why Privileged Access Management Is Key to Preventing Insider Threats
Reply Retweet Like
Michael Ash Jun 20
Humans vs. Machines: Will Adversarial AI Become the Better Hacker?
Reply Retweet Like
Michael Ash Jun 18
Is Your Healthcare Organization Prepared to Withstand a Data Security Breach?
Reply Retweet Like
Michael Ash Jun 11
A Step-By-Step Guide to Vulnerability Assessment
Reply Retweet Like
Michael Ash Jun 6
Enterprise Cloud Security With 2020 Vision
Reply Retweet Like
Michael Ash Jun 5
Establishing Digital Identity Assurance: Who Is in Your Circle of Digital Trust?
Reply Retweet Like
Michael Ash Jun 5
What Are the Different Types of Cyberthreat Intelligence? Has link to X-Force Threat Report
Reply Retweet Like
Michael Ash Jun 1
Are Ransomware Attacks Rising or Falling? Includes link to Verizon Breach Report
Reply Retweet Like
Michael Ash May 31
What's the Best Defense Against Cyberattacks? You Are
Reply Retweet Like
Michael Ash May 30
The 4 Critical Elements of an Incident Response Plan
Reply Retweet Like
Michael Ash May 29
IBM Q’s Dr.Robert Sutor explains the state of the industry
Reply Retweet Like
Michael Ash May 14
Breaking Bad Behavior: Can AI Combat Insider Threats?
Reply Retweet Like
Michael Ash Apr 30
Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 1
Reply Retweet Like
Michael Ash Apr 27
RSA: Taking the Human Element Out of Security
Reply Retweet Like