Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date The Endpoint Security Alphabet Stew Must Include VM and PM Charles Kolodgy, Adjunct Professor, Rivier University | Principal, Security Mindsets Endpoint Security can either be the first or the last line of defense. From the beginning, it has primarily been accomplished by adding some type of s... 3 weeks ago | 37 mins Antivirus For Amazon S3 Workshop: Malware Scanning For Application Workflows Ed Casmer, Founder & CTO, Cloud Storage Security // Gokhul Srinivasan, Sr. Partner Solutions Architect, Amazon Web Services Because of Amazon S3’s flexibility and performance, a growing number of organizations use it as the object store for files uploaded by application use... August 16, 2022 3:00pm MDR vs MSSP: New Challenges Rory McKay | Sales Engineer, ActZero Security expert Rory McKay discusses the differences between MDR and MSSP services regarding security outcomes. He provides a breakdown of particular ... August 18, 2022 5:00pm 2022 H1 Threat Insights: Latest Phishing and DNS Attack Trends Reuben Koh, Director, Security Technology & Strategy – APJ, Akamai In the latest Akamai DNS Traffic Insights Threat Report, our research teams reflect on the most significant and outstanding attack trends and security... August 24, 2022 5:00am Defining the Industry Standard for XDR Mike Storm, Cybersecurity Distinguished Engineer, Cisco Do your security goals feel out of reach? Take back control with Cisco's XDR solution. Learn how our SecureX platform unifies data, analytics, and aut... 2 months ago | 74 mins Menacing Malware: Exposing Linux Threats Lurking in Your Multi-Cloud Brian Baskin, Giovanni Vigna 90% of cloud runs on Linux, but current countermeasures are focused on addressing Windows-based threats, leaving multi-cloud deployments vulnerable to... 2 months ago | 61 mins Antivirus For Amazon S3 Workshop: Malware Scanning For Application Workflows Ed Casmer, Founder & CTO, Cloud Storage Security // Aron Eidelman, Partner Solutions Architect, Amazon Web Services Because of Amazon S3’s flexibility and performance, a growing number of organizations use it as the object store for files uploaded by application use... 2 months ago | 177 mins Menacing Malware: Exposing Linux Threats Lurking in Your Multi-Cloud Brian Baskin, Giovanni Vigna 90% of cloud runs on Linux, but current countermeasures are focused on addressing Windows-based threats, leaving multi-cloud deployments vulnerable to... 4 months ago | 61 mins Defending Against Large-Scale Mobile Banking Malware Greg Hancell, Ben Balthazar & Stefaan Seys, OneSpan Financial institutions have a complex challenge to defend against malicious apps like the Anubis malware, which recently reappeared. Anubis targets t... 4 months ago | 52 mins ThreatWise TV: Benefits of Cisco Secure Endpoint Jason Wright, Solutions Marketing Manager, Cisco Want to learn how Cisco Secure Endpoint can strengthen your organization's security defenses? Take an in-depth look in this episode of ThreatWise TV b... 5 months ago | 13 mins Load more