Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date May TRU Intelligence Briefing Ryan Westman, Paul Aitken, Keegan Keplinger, Derek Thomas, Spence Hutchinson Join eSentire’s Threat Response Unit (TRU) as they share new research-driven observations of malware, notable vulnerabilities, threat actor groups, an... 1 week ago | 45 mins Application Persistence: How to Secure Your Security Isha Khaira, Customer Success Manager & Neeraj Annachhatre, Product Marketing Manager You’ve made a solid investment in IT security. After all, you're not about to let your organization fall prey to cyber threats. Here's the bad news: ... 1 year ago | 34 mins Application Modernization: The Cloud Native Way Girish Krishnan, Red Hat, Principal Architect Jeff Winn, Red Hat, Chief Architect Today Girish Krishnan welcomes Jeff Winn, a Chief Architect at Red Hat. We will follow Jeff through recommended areas of focus for modernizing applica... 2 years ago | 20 mins Solve Storage Persistence for Containers with NetApp Trident Diane Patton, Technical Marketing Engineer, NetApp Join us as we kick off our DevOps Master Class series with NetApp Trident for containers. NetApp was the first to offer a robust, open source solutio... 3 years ago | 63 mins Accelerate Your Data Infrastructure Transformation w/ VMware + Cloudian + Splunk Henry Golas, Director of Technology, Cloudian | Pete Koehler, Staff Technical Marketing Architect, VMware Cloudian Webcast: Accelerate Your Data Infrastructure Transformation with VMware and Cloudian - Spotlight on Splunk Join VMware and Cloudian for a tec... 1 year ago | 48 mins Kubernetes and Storage: A Move From Stateless to Stateful Infrastructure Josh Goldenhar, VP of Product Marketing, Lightbits Labs In this 30-minute webinar, we'll discuss how Containers are moving from a stateless micro-service oriented compute infrastructure to a stateful one - ... 1 year ago | 49 mins Protecting from ransomware attacks with DNS Artsiom Holub, Senior Security Analyst The session is focused on the ways DNS can be used to improve protection against ransomware campaigns and speed up investigations of such incidents. W... 9 months ago | 32 mins A Security Analyst’s Deep Dive Analysis of the Solarmarker Malware Dropper Willow Shipperley and Nick Cavalancia Solarmarker is a modular, multistage, heavily obfuscated PowerShell loader, which leads to a .NET compiled backdoor being executed. Solarmarker is fle... 6 months ago | 85 mins Turbocharge Your Applications with Persistent Memory NetApp and Intel Traditional IT infrastructure cannot keep up with the vast amounts of data that must be analyzed and shared in real time. NetApp® MAX Data server soft... 2 years ago | 49 mins Distributed development and native images: Quarkus, why and how? Georgios Andreanakis, Red Hat; Dominik Winter, Viada; Sun Tan, Red Hat; Mark Little, Red Hat; Michael Simons, Neo4j Distributed development and native images with modern approaches to persistence on top of an extensible base features makes developer dreams come true... 2 years ago | 91 mins Load more