Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Ransomware Roulette: The Evolution of Cyber Insurance for MSPs and Their Clients Joseph Brunsman, Brunsman Advisory Group; Drew Schlussel, Wasabi; Kurt Abrahams, MSP360 Ransomware attacks aren’t going anywhere anytime soon, in fact, they are only increasing daily. Recovering from an attack shouldn’t cost you your bus... March 30, 2023 3:00pm Varnish Configuration Language 101: Basic Controls, Use Cases, & Benefits Thijs Feryn, Tech Evangelist, Varnish Software Having a full-blown programming language to describe the configuration of your cache gives you unparalleled flexibility to tune the behavior of the ca... 1 month ago | 29 mins 7 Steps to Secure Your Kubernetes Cluster Pavel Chistikov, Kasten by Veeam Running and securing Kubernetes clusters in production is a complex process, but it doesn’t have to be. Join Pavel Chistikov at Kasten by Veeam who wi... 1 week ago | 57 mins Take Control of Your Cloud Data Security Terry Ray, SVP, Data Security GTM, Imperva & Author Richard Stiennon of IT Harvest Take Control of Your Cloud Data Security: Best Practices for Proactive Protection in Any Cloud Service Looking to secure your cloud data but don't kn... 2 days ago | 60 mins Entering the Cloud-Native Security Era LogRhythm Product Director, Matt Willems and Derek Watkins Security leaders need to routinely assess security risks and leverage best practices for mitigating risks. Software as a Service (SaaS) is a delivery ... 2 days ago | 66 mins Effectively Protect Your Microsoft Azure Cloud Deployments from Code to Runtime Shantanu Gattani, Sr. Dir. Prod Mgmt., Om Moolchandani, Principal PM, Heather Peyton, Dir., Prod Marketing When it comes to your public cloud services, achieving complete visibility, and being able to quickly (and accurately) prioritize, analyze and remedia... 3 days ago | 47 mins Cloud Native Security Everywhere: From Dev to Deploy Adam Bergh and Joey Lei As more and more applications are developed in Kubernetes, more attacks are inevitable, and without proper security measures in place, organizations w... March 28, 2023 4:30pm Network automation 101: Getting started with network automation Dafne Mendoza and Trishna Guha Networks have already begun to adapt to meet the next generation of needs as digital transformation accelerates to include better connectivity across ... 15 hours ago | 54 mins What´s new in Data Protector 11.03 and Data Protector for Cloud Workloads 5.2 Geoff Rennie, Pre-Sales System Engineer and Partner Business Manager & Troy Drewry, Data Protector Product Manager, OpenText These days, your workers need access to data from anywhere at any time. But providing easy access while complying with security regulations is difficu... 2 days ago | 55 mins Serverless Security on AWS Hamdy Eed, AWS Sr. Partner Solutions Architect & Sergey Dudal, Intetics PM/Cloud Solutions CoE Leader Running your applications on AWS gives you complete control, cost-benefit, and agility for your business. But many customers are using Amazon EC2 and ... 2 days ago | 54 mins Load more