Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Beyond Your Radar: Uncovering The Full Extent Of Your Attack Surface Gino Rombley, Senior Sales Engineer at Cyberint In many cases, the external attack surface is thought of as the external IT infrastructure: domains, IP addresses, VPN portals, Internet-facing softwa... 2 days ago | 62 mins How to Supercharge your CMDB and Realize Value Sooner Mike Mahoney, Sr. Director, Partner Marketing, Technology Alliances at Tanium Your Configuration Management Database (CMDB) should be the single source of truth to power effective processes and decision-making across your IT org... 1 week ago | 26 mins Automating Cyber Risk Management with FortifyData and Nanjgel Solutions Jude Pereira, CEO of Nanjgel, and David Oliveira, Director at FortifyData Automating Cyber Risk Management with FortifyData and Nanjgel Solutions: Reducing cyber risk by automating continuous asset discovery and assessments ... 2 weeks ago | 49 mins Taking control of your IBM environment with ServiceNow Piyush Patel, ServiceNow, Victor Parades-Colonia, ServiceNow & Kevin Rieske, Anglepoint It’s no surprise that IBM license agreements are varied, intricate, and frequently updated. Which can make finding the data to prove compliance costly... 4 weeks ago | 43 mins Automating Cyber Risk Management with FortifyData and Nanjgel Solutions Jude Pereira, CEO of Nanjgel, and David Oliveira, Director at FortifyData Automating Cyber Risk Management with FortifyData and Nanjgel Solutions: Reducing cyber risk by automating continuous asset discovery and assessments ... June 27, 2023 8:00am 5 Steps to Combating Emerging Threats with Network Security Joe Thibault, Solutions Marketing Manager Cybercriminals and the threats they pose are becoming more sophisticated than ever, making it crucial to stay updated on the latest trends and techniq... June 26, 2023 10:00am 5 Steps to Combating Emerging Threats with Network Security Joe Thibault, Solutions Marketing Manager Cybercriminals and the threats they pose are becoming more sophisticated than ever, making it crucial to stay updated on the latest trends and techniq... June 27, 2023 3:00pm 5 Steps to Combating Emerging Threats with Network Security Joe Thibault, Solutions Marketing Manager Cybercriminals and the threats they pose are becoming more sophisticated than ever, making it crucial to stay updated on the latest trends and techniq... June 28, 2023 4:30am The ITAM Triforce: Discover the power of SAM, HAM, and the CMDB Daniel Slocum and Eric Martinez of ServiceNow ITAM The workforce is rapidly changing in the new normal, and your asset management must adapt—requiring increased visibility into your hardware and softwa... 3 months ago | 58 mins Webinar - Surprising Secrets of Cyber-Resilience Steve Hunt - ISSA Hall of Fame Can you prevent your company from serious damages in a cyber attack? In a cyber attack, hackers can access critical systems and data, compromising th... 2 weeks ago | 40 mins Load more