Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Developing with Python and Open Source in the Enterprise Cody Foxwell, Anaconda Solutions Engineer Using Python to build data applications for an enterprise organization brings many benefits, including leveraging the innovation of the community to h... June 6, 2023 4:00pm Business Email Compromise: How AI Has Changed the Playing Field Dr Rebecca Wynn, Click Solutions Group | Kate Fazzini, CEO, Blue Line Recoveries Business Email Compromise (BEC) is an example of a phishing attack, used to steal money and/or sensitive corporate data. No organisation is immune to ... June 8, 2023 3:00pm Protect your business from political and religious hacktivists Pascal Geenens - Director, Cyber Threat Intelligence | Ron Meyran - Senior Director, Corporate Enablement Hacktivist groups are targeting victims around the world and no one is immune. Join this webinar to get insights about cyber attack trends led by pro-... 1 month ago | 26 mins Protect your business from political and religious hacktivists Pascal Geenens - Director, Cyber Threat Intelligence | Ron Meyran - Senior Director, Corporate Enablement Hacktivist groups are targeting victims around the world and no one is immune. Join this webinar to get insights about cyber attack trends led by pro-... 1 month ago | 25 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 3 months ago | 38 mins Assess Your Vulnerability to OWASP Top 21 Automated Threats using Radware's BVS Krishnakumar Satheesh We invite you to join our upcoming webinar, on how you can leverage the Bad Bot Vulnerability Scanner Assessment to identify your vulnerability to OWA... June 12, 2023 7:00am End of On-Premise WAFs and Need for a New Application Protection Architecture Prakash Sinha In today's digital age, businesses are constantly seeking new ways to innovate and stay competitive. As more companies move to a majority online prese... 3 months ago | 50 mins Assess Your Vulnerability to OWASP Top 21 Automated Threats using Radware's BVS Krishnakumar Satheesh We invite you to join our upcoming webinar, on how you can leverage the Bad Bot Vulnerability Scanner Assessment to identify your vulnerability to OWA... June 12, 2023 12:00pm Accelerate Modern Engagements with Hybrid Cloud Paul Nashawaty, Principal Analyst, Enterprise Strategy Group; Tony Rylands, Director, Cloud Strategy, Zones, LLC In today's business environments, organizations are tasked to do more with less. In fact, Enterprise Strategy Group states organizations are asked to ... 3 hours ago | 36 mins Under the Hood: A Deep Dive into the Next Evolution of Risk Management Alfred Trevino - Cloud Security Architect Are you interested in learning how to effectively manage risks in your cloud environment? Join us for a Check Mates webinar on leveraging the Cloud Na... June 1, 2023 3:00pm Load more