Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Mimecast Coffee Chat Series- Phishing Scott Jenner Phishing is one of the oldest forms of email attack, but it’s still prevalent in organizations of all sizes. It happens when fraudsters spam users onl... 2 months ago | 20 mins Coronavirus, Computer Virus, Cyber Threats: A False Sense of Security Ekta Mishra, APAC Membership Director & Country Manager - India & Dr. Ngair Teow-Hin, CEO, SecureAge Technology With most office workers working from home due to Coronavirus pandemic, computer virus attacks on home computers are now a major issue facing the worl... 2 years ago | 37 mins Using the TPM to Solve Today’s Most Urgent Cybersecurity Problems Webcast Stacy Cannady, CISSP (Cisco) and Monty Wiseman, Security Architect (Intel) With the recent discovery of the flaw in OpenSSL, Heartbleed, even the least computer-savvy among us has seen the potential threat and damage caused b... 9 years ago | 63 mins The Role of AI in IoT Security May Wang, CTO & Co-founder of Zingbox Artificial Intelligence, machine learning, and deep learning are the raves in network security. It's perceived as the only practical approach to stayi... 5 years ago | 61 mins iSpeak IOT: Security & Cloud Jeanne Morain, Chris Armstrong Security and compliance standards for IOT are top of mind as viruses such as Marai plague unsuspecting devices. Join Jeanne Morain and special guests... 6 years ago | 34 mins Why It's Time to Upgrade to a Next-Generation Firewall Eric Crutchlow, Sr. Product Manager Dell SonicWALL Distributed networks face the ongoing challenge of securing a continually evolving network perimeter. As threats have evolved to exploit the shifting ... 9 years ago | 27 mins A Biological Perspective of Malware Guy Propper, Security researcher at Deep Instinct The term “virus” exists both in biology and in computers, but how deep are the similarities and differences between biological viruses and computer ma... 5 years ago | 35 mins MSSP Services: Security for Distributed Organizations Ed Ferrara, Principal Analyst, Forrester Research Large, multi-site organizations are very different from enterprises. IT staffing is typically very lean. While network security is a priority, in smal... 9 years ago | 48 mins 3 Things To Know About Comodo's Threat Intelligence Report Comodo Cybersecurity The Comodo Threat Intelligence Lab monitors, filters and contains, and analyzes malware, ransomware, viruses and other "unknown" potentially dangerous... 5 years ago | 2 mins Deep Threat: Security Lessons from the Online Adult Entertainment Industry Richard Hollis, Director, Risk Factory Gross revenues for the online adult entertainment industry exceeded $150 billion dollars last year from transactions conducted over more than 5 millio... 7 years ago | 42 mins