Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Integrated data center management in a new world Jeremy Clute, VP of Business Development, Nlyte Software Over the past year, data center operators have been adjusting to greater scrutiny from the public and governing bodies. This scrutiny has translated i... 1 week ago | 60 mins Protect Your Business From Data Privacy Leaks Using Automated Security Testing James Croall, Product Management Director, Synopsys Join us for a webinar on the automated source code data protection measure with James Croall, Product Management Director, Synopsys. James will discus... 4 weeks ago | 39 mins Enabling the Enterprise with Private Wireless and Edge Computing Solutions Bob Laliberte, Principal Analyst (ESG); Ken Byrnes, Global Head, Telecom Line of Business (Dell Technologies) Across industries and use cases business leaders are poised to deliver enhanced and new experiences by implementing private wireless and edge computin... April 19, 2023 2:00pm Container Security Essentials David Benas, Associate Principal Consultant, Synopsys As the popularity of cloud-native applications continues to surge, containers are becoming the preferred option to package and deploy these applicatio... 3 weeks ago | 61 mins Varnish Configuration Language 101: Basic Controls, Use Cases, & Benefits Thijs Feryn, Tech Evangelist, Varnish Software Having a full-blown programming language to describe the configuration of your cache gives you unparalleled flexibility to tune the behavior of the ca... 1 month ago | 29 mins The FAIR data movement and data protection Alan Morison, Advanced Data Technologies Consultant and Writer Tired of data sprawl, not knowing where your company's data is, or how to reduce data mismanagement risk? You may not know it, but encouraging your le... 1 month ago | 52 mins Leading Your Way to Better Demand Capture Kristin Prosowski, Vice President of Demand & Integrated Solutions and John Steinert, CMO, TechTarget Leads could be called “the original B2B intent data” and they’re certainly a first-party component of many good data-based strategies. At the same tim... 1 month ago | 59 mins XPOSURE 2023 - IPv6: Security Teams’ Blind Spot Yotam Mazurik, Senior Security Researcher at Pentera The rapid pace of technological advancement means that security frameworks like MITRE ATT&CK or NIST may not always have the most up-to-date informati... 13 hours ago | 15 mins Take More Control of Your Security Rating with Custom Scorecard Michelle Koestani, Manager, Solutions Architects | Maddy Maletz, Associate Product Marketing Manager We publish 100B+ vulnerabilities and attributions weekly. That’s a lot of data, and we realize one Scorecard doesn’t fit all, especially when your o... 1 day ago | 30 mins The Rapid7 Annual Vulnerability Intelligence Report [EMEA] Caitlin Condon, Erick Galinkin and Ron Bowes from the Rapid7 Research team Rapid7’s Vulnerability Intelligence Report is an annual research report that highlights CVE exploitation trends, explores attacker use cases, and offe... 15 hours ago | 61 mins Load more