Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date UEFI Debug with Intel Architectural Event Trace Alan Sguigna (ASSET InterTech) Architectural Event Trace (AET) is a technology on modern Intel silicon that enables processors to provide real-time event trace information. AET diff... 1 year ago | 45 mins The Rise of Advanced Malware and Evasive Network Attacks Steve Smith, Sr. Technical Marketing Manager, Intel Security Networking communication protocols make it possible for the internet to work. Unfortunately, criminals can use those trusted systems to obfuscate mali... 8 years ago | 40 mins The Rise of Advanced Malware and Evasive Network Attacks Steve Smith, McAfee, Sr. Technical Marketing Manager Networking communication protocols make it possible for the internet to work. Unfortunately, criminals can use those trusted systems to obfuscate mali... 8 years ago | 35 mins Gagnez la guerre contre les attaques persistantes avancées ! Youssef Agharmine McAfee Advanced Threat Detection : le seul remède véritablement efficace contre les attaques persistantes avancées Les entreprises telles que la vôtr... 8 years ago | 43 mins What hackers use to cloak Advanced Persistent Threats! Steve Smith, Technical Product Marketing Manager Advanced Evasion Techniques (AETs)work with Advanced Persistent Threats (APT) to disguise cyber attacks in order to avoid detection and blocking by in... 8 years ago | 34 mins Data Center Futures - New Build or Legacy Cloud Retrofit? John Booth, BCE; Bob Crooks, BCS; Richard Barrington, ICEOTOPE; Vic Smith, Colt; Gary Thornton, AET4IT Ltd IT Departments are pressured into using cloud services, but they face challenges in delivering these services, should they move into new build cloud, ... 8 years ago | 55 mins What hackers use to cloak Advanced Persistent Threats! Steve Smith - Technical Product Marketing Manager Advanced Evasion Techniques (AETs)work with Advanced Persistent Threats (APT) to disguise cyber-attacks in order to avoid detection and blocking by in... 8 years ago | 34 mins Von Ihrer Firewall der nächsten Generation sollten Sie mehr erwarten... Motasem Al-Amour, Sales Sales Engineer, McAfee GmbH Erfahren Sie im Rahmen dieses Webcasts, wie Sie den zunehmenden Bedrohungen für die IT-Sicherheit und den Anforderungen Ihres Unternehmens mit den Fir... 8 years ago | 46 mins Sanofi’s and SGS’S Implementation of BPOG’S Leachable Risk Assessment model... Ken Wong, Deputy Director at Sanofi Pasteur and Dujuan Lu, Manager/Global Lead of Extractables & Leachables at SGS Full Title: Case Study and Experience on Sanofi's and SGS's Implementation of BPOG's Leachable Risk Assessment Model and Extractable Testing Protocol ... 3 years ago | 89 mins Malware’s new camouflage Alan Cottom, McAfee Advanced Evasion Techniques (AETs) work with Advanced Persistent Threats (APT) to disguise cyber-attacks in order to avoid detection and blocking by i... 8 years ago | 49 mins Load more