Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Are your endpoints safe? Extending managed detection and response capabilities Rakesh Shah, AVP Product Management – Cybersecurity Organizations are looking for ways to protect against threats across a growing attack surface, and extended detection and response, or XDR, can help d... 2 weeks ago | 30 mins Modernize endpoint detection & response with AI-powered security solutions Jamie Tan, Security Technical Specialist, IBM Technology, Singapore & Jon Panker, TechTarget There is a set of worldwide problems at once so daunting and yet so pressing that solutions simply can’t wait. We must accelerate the process of disco... 2 weeks ago | 20 mins Stellar Cyber Open XDR Platform - Enterprise Demonstration Daniel Cheng, SE Manager, Stellar Cyber Stellar Cyber Open XDR platform delivers world-class, comprehensive, unified security without complexity, empowering security teams of any size and sk... 2 weeks ago | 15 mins XDR Does Not Exist Without NDR Matt Bromiley & Erik Hjelmstad, NETSCOUT In today’s world of enterprise security, many technology options are available—perhaps too many. Despite all the options available, security teams sti... 2 months ago | 62 mins Securing the Legal Industry with the World’s Fastest 4-Hr Incident Response SLA Larry Gagnon, SVP Incident Response With unparalleled access to valuable information across all facets of the public and private sectors, legal firms have been subject to cyberattacks le... 6 months ago | 42 mins Close It Down: Automated Security with McAfee & Swimlane Martin Ohi, McAfee Solution Architect & Jay Spann, Swimlane Security Automation Evangelist Many organizations struggle to find the perfect combination of tools and processes that will enable them to provide top-notch protection with fast det... 10 months ago | 37 mins Delivering Agile Cyber-Resilient Capabilities Kev Johnson - Technical Architect | Rubrik The modern cybersecurity landscape continues to evolve rapidly, and as it evolves, so too do the cyber-risks companies face. Year after year threat ac... 5 months ago | 23 mins Briefing: Cyber Weapons Used in the Ukraine-Russia War Trustwave SpiderLabs’ Senior Research Manager Karl Sigler and Trustwave SpiderLabs’ Senior Research Managers Pawel Knapczyk Listen in as Trustwave SpiderLabs’ Senior Research Managers Karl Sigler and Pawel Knapczyk discuss the highly targeted techniques and methods used in ... 4 months ago | 41 mins Automated Secure Offboarding: Mitigating Data Breach & Financial Loss Jon Oltsik, Senior Principal Analyst and Fellow, ESG & Ramin Ettehad, Co-Founder and VP, Strategy, Oomnitza The great resignation, hybrid workforce and current economic uncertainty have created unprecedented employee turnover. Beyond the business impact, IT ... 5 months ago | 42 mins Keeping Networks Jolly - Automated Threat Prevention & Total Visibility Trinity Cyber’s VP of Threat Analysis Jeremy Brown and Gigamon’s Field Chief Technology Officer, Ian Farquhar The relentless threat of ransomware, phishing campaigns, data exfiltration, malware command-and-control, and stealthy exploits…it’s a worrisome challe... 1 year ago | 43 mins Load more