Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Stop the Campus Wifi Blame with VMware Edge Network Intelligence John Turner, VMware In higher education, the wireless network is the core backbone of campus connectivity. Wireless networks are still magic for the end user - more so ... March 27, 2023 6:00pm The Data Breach Blame Game: Employees or Employers? David McClelland, Technology Reporter, Robert O'Brien, Cyber Security Awareness for Dummies Author & MetaCompliance CEO With cyber security lawsuits on the rise, the probability and financial impact of cyber incidents are ever-growing for organisations. The aftermath of... 11 months ago | 43 mins Stop the Blame Game in Engineer to Order Andrew Reiser, Mountain Point; Miguel Tam, Propel How the Cloud Helps Sales, Engineering and Operations to Create Winning Quotes Changing customer expectations, new types of competitors, and more comp... 4 years ago | 53 mins Beyond the Blame Game: Improving Patient, Physician, Pharma Relation Andrew McConaghie We often hear patients report a lack of ‘connection’ with their physician, and where lifestyle plays a role in the development of a disease, such as o... 4 years ago | 59 mins The Blame Game: Does Attribution Matter? John McClurg, Senior VP & CISO, BlackBerry; John McCumber; Matt Waddell; Brandon Dunlap (Moderator) You’ve been attacked and you’re defending your organization against the intrusion. Do you need to know who’s behind the attack, and why they’re target... 3 years ago | 58 mins Podcast: When Initial Access Brokers Attack Digital Shadows CISO Rick Holland and Threat Researchers Alec Alvarado, Charles Ragland, and Ivan Righi ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover: - The team talk... 2 years ago | 25 mins How to Avoid the Citrix Blame Game Colin Pittham, VP EMEA & Idjiwa Adjido, Head of Sales Engineering - ExtraHop When applications and desktops are delivered over Citrix, the Citrix administration team becomes the front-line for responding to complaints about slo... 6 years ago | 29 mins Podcast: When Initial Access Brokers Attack Digital Shadows CISO Rick Holland and Threat Researchers Alec Alvarado, Charles Ragland, and Ivan Righi ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover: - The team talk... 2 years ago | 25 mins STOP Finger-Pointing! Know EXACTLY if it’s the Application, Network or Server Wilson Leong, CA Technologies For many IT Operations Teams, by the time you’re alerted to application performance issues, your end-users have already been impacted. And in many cas... 9 years ago | 60 mins [Video Interview] Rami Mizrahi: Threat Detection, Nation-state Attacks and Yahoo Rami Mizrahi, VP R&D, TopSpin Security BrightTALK caught up with TopSpin Security's Rami Mizrahi for an in-depth conversation on the current state of information security, today's threatsca... 6 years ago | 9 mins