Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 6 Ways to Improve AppSec Accountability Adrian Acuna, Senior Sales Engineer AppSec teams often struggle to keep up with the rapid code releases produced by DevOps teams. Testing falls behind as development speeds up. Since slo... 7 months ago | 41 mins See An ASOC Tool In Action Adrian Acuna, Senior Sales Engineer The right application security orchestration and correlation (ASOC) tool automates time-consuming application security workflows and makes software se... 6 months ago | 59 mins The 5 Executive Blind Spots Around Observability Brandon Shopp, Group VP of Products, SolarWinds; Peggy Bresnick-Kendler, Moderator, Information Week Only 1 in 10 enterprises adopted an observability strategy in 2020. By 2024, Gartner predicts that number will triple among companies progressing clou... June 7, 2023 4:30am Reduce mean-time-to-act by tracing alerts through their lifecycle Jason Walker, Chief Technology Officer, BigPanda The sheer volume of events from monitoring tools inundating IT teams is one of the biggest contributors to long mean-time-to-act (MTTA). As a result, ... 19 hours ago | 51 mins How a Risk-based XDR Approach Improves Threat Detection and Response Jon Oltsik, Analyst and Fellow with Enterprise Strategy Group and Briana Farro, Director, XDR Product Management with Cisco Existing threat detection and response technologies are not as effective as they need to be for today’s security landscape. This unfortunate reality i... 2 weeks ago | 48 mins How To Enable the Hybrid Workforce and Reduce Cyber Threat Bruce Dodworth, Sea Glass and Guests Staying connected, and enabling first-class collaboration and communication for your employees isn’t always easy. As we continue to evolve the way we ... June 29, 2023 9:00am Beyond Misconfigurations Correlating Threats to Truly Understand Your Cloud Risk Ofer Yarom, Principal Product Manager, Posture Control, Zscaler Today’s attackers leverage sophisticated techniques against their target organizations, using multiple attack vectors to exploit several security weak... 2 months ago | 45 mins TIP the Scales Through Effective Threat Intel Management Mark Bermingham, Dir. Product Marketing, Cyware; Mark Carosella, Sr. Solutions Engineer, Cyware Threat intelligence is only useful if you do something about it, but most conventional TIP products only collect feeds, leaving it up to security team... 1 month ago | 38 mins AIOps & Stateless Core Pave the Future of Hybrid Cloud Networking Rahul Aggarwal, Founder & CEO, Augtera Networks, and Ali Shaikh, Chief Product Officer, Graphiant Join along in the discussion with Rahul Aggarwal, Founder & CEO at Augtera Networks, and Ali Shaikh, CPO at Graphiant as they discuss how the two comp... 1 month ago | 29 mins Session 3 | Turning Cross-Stack Correlation Into Better Collaboration Kevin Sparenberg & Matt Quick Watch this webcast and learn how to leverage SolarWinds tools to communicate clearly and concisely to management, end users, or even ISPs. 5 months ago | 34 mins Load more