Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Is Your Security Engineered To Beat Social Engineering? Matt Aldridge, Principal Solutions Consultant Social engineering tactics – using the art of deception in cyberattacks – have climbed to the top spot as the #1 cause of cybersecurity breaches. Our ... August 9, 2022 3:00pm Getting Started with Carbonite® Migrate Demonstration Many situations might prompt an organization to migrate data, like a merger, hardware upgrade, a move to the cloud or application end-of-life. But all... 7 days ago | 6 mins Why Should I Care About Being Cyber Resilient? Matt Aldridge, OpenText | Grayson Milbourne, OpenText | Ash Hunt, Sanne Group With cyber-attacks growing in rate and sophistication, and the attack surface evolving quicker than ever before, cyber resilience is crucial. Cyber re... 3 months ago | 31 mins Detection and Response: Neutralising and Minimising Cyber Threats Matt Aldridge, OpenText | Steven Wood, OpenText | Ash Hunt, Sanne In light of evolving cyber risks - from ransomware, to phishing, to social engineering - it is no longer a question of “if?” but “when?” attacks will ... 2 weeks ago | 39 mins The State of Phishing: Attacks Remain High and Few Are Spared Duncan Brown, Research Vice President, Security & Trust, IDC No business is fully immune to phishing attacks. Experts at IDG and Carbonite + Webroot, OpenText Security Solutions, shed light on the current state ... 1 month ago | 2 mins Prevent and Protect: Staying One Step Ahead of Attacks Matt Aldridge, OpenText; Jonathan Barnett, OpenText; Ash Hunt, Sanne Group With cyber threats like phishing and ransomware on the rise, and with companies moving to cloud services at a rate unheard of, all organisations must ... 2 months ago | 45 mins Getting Started with Carbonite® Availability Carbonite Demonstration High availability for critical applications Downtime strikes IT organizations from a multitude of sources and IT teams are certain that downtime will... 1 month ago | 7 mins Protecting & Migrating Red Hat OpenShift Container-Based Applications on AWS Red Hat & Trilio Red Hat OpenShift Service on AWS (ROSA) enables enterprises to develop, deliver and manage applications more efficiently than ever before. Kubernetes ... August 9, 2022 12:00pm 5 Reasons Why Traditional Backup Doesn’t Work During a Ransomware Attack Nasuni's John Bilotti, CIO/CISO, Barrie Kuza, VP of Product Management and Anne Blanchard, Sr. Director of Product Marketing The evolution of ransomware has spurred many organizations to focus on plans for recovering from attacks as quickly and efficiently as possible. Compa... August 11, 2022 3:00pm Immutable and Air-Gapped Backups are Dead... Ransomware 3.0 Killed Them John Burke - CTO, Nemertes | Pete Nourse - CRO & CMO, Peter Smith - Founder, The Cyber Badger As companies bolster their security strategies, attackers are finding new ways of spotting and exploiting vulnerabilities within corporate IT stacks t... August 16, 2022 3:00pm Load more