Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date [EMEA] Cybersecurity Series: Hackers 're Gonna Hack - Pt 2/3 Jason Hart Foundational Components to Enable a Cyber Target Operating Model In the second webinar of the ‘Cybersecurity Series’, Jason Hart, Chief Technology Of... 2 days ago | 44 mins The Perfect Storm: The Ransomware 3.0 Explosion and New Risks to Your Data John Burke - CTO, Nemertes | Pete Nourse - CRO & CMO, Asigra and Kevin Johnson, CEO of Secure Ideas Cyber attackers have been enjoying favourable conditions for attacks in recent years. The shift to remote working created huge vulnerabilities within ... July 12, 2022 3:00pm [EMEA] Cybersecurity Series: Hackers 're Gonna Hack - Pt 3/3 Jason Hart Cybersecurity KPIs to Track & Share with Your Board July 28, 2022 11:00am Immutable and Air-Gapped Backups are Dead... Ransomware 3.0 Killed Them John Burke - CTO, Nemertes | Pete Nourse - CRO & CMO, Asigra and Guests As companies bolster their security strategies, attackers are finding new ways of spotting and exploiting vulnerabilities within corporate IT stacks t... July 26, 2022 3:00pm Top 3 Ways to Build Security into DevOps Natasha Gupta, Synopsys Organizations are adopting DevOps to speed up software production, and building secure, resilient software means ensuring that application security ca... July 28, 2022 9:00am WisdomTree - A New Asset Class: Investing in the Digital Asset Ecosystem Ben Dean, WisdomTree | Pierre Debru, WisdomTree A New Asset Class: Investing in the Digital Asset Ecosystem Blockchain technology supports many megatrends such as decentralised finance (DeFi), Web... July 12, 2022 8:00am The Next Big Thing in Ransomware – Protection essentials for Ransomware 3.0 John Burke - CTO, Nemertes | Pete Nourse - CRO & CMO, Asigra and Guests Cyber criminals understand that a successful backup recovery will prevent them from getting paid after a ransomware attack. And with new, sophisticate... August 9, 2022 3:00pm 2021 OWASP Top 10: Injection - Ep 3 John Wagnon, Solutions Architect, F5 Injection is a broad class of attack vectors where untrusted input alters app program execution. This can lead to data theft, loss of data integrity, ... 1 month ago | 12 mins Leveraging a First Party Data Strategy in the 3rd Party Cookie Apocalypse Matt Parisi, Director of Product Marketing,Tealium Storm clouds are on the horizon when it comes to how to successfully and securely leverage the power of customer data. What are marketers to do when t... 2 days ago | 48 mins PowerStore 3.0: La nueva generación - 30 de junio Oscar Rivas Medina y José Álvarez Píriz ¡Dell Technologies te presenta Powerstore 3.0! Conoce de primera mano las nuevas funcionalidades de nuestra Solución de Almacenamiento mas disruptiva... 2 days ago | 41 mins Load more