Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Log4j: What to Know and How to stay safe Evan Johnson, Dan Gould, Neil Patel The Log4j vulnerability has suddenly dominated headlines — and a week of rapid security responses, given its critical nature. Join our brief webinar t... 3 days ago | 38 mins Focus on Consumer Duty John Long A brief summary of key things to consider from evolving Consumer Duty regulations. In discussion with John Long, Head of Strategic Accounts at threes... 4 days ago | 15 mins Advisers' place in the value chain Henry Cobbe A brief interview with Abhijit Rawal on advisers' place in the value chain in a context of active consolidation and integration within the UK advice s... 4 days ago | 9 mins Blockchain 101 - A Brief Introduction (Blockchain #1/4) Jay Kumar, NTree International Blockchain has begun to distrupt a variety of key industries, ranging from the Financial Sector to the Commodity Markets. It may seem a daunting topic... 3 weeks ago | 23 mins The new F5G fibre network – a future proof architecture Luca Pesando, ISG F5G Chair, Hongyu Li and Crest Zou, ISG F5G members The F5G network has three characteristics for extending and enhancing fixed networks, defined as eFBB, FFC and GRE. To implement these characteristics... July 11, 2022 2:30pm Deconstructing Destructive Attacks to Separate Fiction from Facts Rick McElroy, Tom Kellermann, Paul Miller As a founding member of the Joint Cyber Defense Collaborative (JCDC) convened by the U.S. Cyber and Infrastructure Security Agency (CISA), VMware is a... 2 weeks ago | 59 mins You’ve Got to Move It: Data Protection and Privacy with Cross-Border Transfers Chris Wall, John Rosenthal, Debbie Reynolds, and David Wallack As borders blur and businesses expand, many companies face accelerating challenges in data protection, privacy, and cross-border transfers. Dealing wi... 1 week ago | 66 mins Vulnerability Scanning: What Every IT Pro Needs To Know Mark Winter, VP Products and Michael Courtney, Product specialist If you are responsible for IT Security within your own organization, regular network vulnerability scanning is a BASIC procedure recommended by virtua... 1 week ago | 25 mins June TRU Intelligence Briefing Paul Aitken, JR DePre, Matt Tilley, Derek Thomas Join eSentire’s Threat Response Unit (TRU) as they share new research-driven observations of malware, notable vulnerabilities, threat actor groups, an... 3 weeks ago | 38 mins 6.0 - orcharhino Reloaded - Insights to the New Major Version Fabrice Brimioulle With release of version 6.0 orcharhino has undergone some major changes under the hood. In this webinar we will address these changes and focus on the... July 27, 2022 2:00pm Load more