Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How To Protect Your DNS With A Real PDNS Implementation Paul Mockapetris, Chief Scientist at ThreatSTOP When it comes to implementing security for your systems, of course there are shortcuts you can take. But should you? Watch this video below as Paul wa... 15 mins ago | 3 mins The Evolving Threat of Ransomware Haroon Malik. Security Consulting Director - NTT DATA UK Join us in this panel session, where industry leader experts of the from NTTDATA Services, NTT DATA UK, NTT DATA Italia, GroupSense and SentinelOne an... March 29, 2023 3:00pm Case study: Data protection trends and ransomware defense in the real world Cristophe Bertrand | Colm Keegan | Saurabh Sensharma | Rob Petrone Data continues to grow in scale and importance for companies of all shapes and sizes. As it does, so too does the imperative to protect it. Threat act... 19 hours ago | 50 mins Disrupt the Ransomware Threat Actors: Focus on Attack Chains Mark Harris,Cybersecurity Advisor & Brette Peterson, Prod Mkt Mngr Proofpoint; Brandon Dunlap, Moderator Ransomware continues to dominate the headlines with a wide range of organizations impacted. Part of its staying power is that ransomware threat actors... 20 hours ago | 60 mins Ransomware Roulette: The Evolution of Cyber Insurance for MSPs and Their Clients Joseph Brunsman, Brunsman Advisory Group; Drew Schlussel, Wasabi; Kurt Abrahams, MSP360 Ransomware attacks aren’t going anywhere anytime soon, in fact, they are only increasing daily. Recovering from an attack shouldn’t cost you your bus... March 30, 2023 3:00pm dataBelt® – A complete managed service for Security Certificates Matt Smith How many of you have experienced a service outage due to an expired security certificate? It’s probably more suitable to ask who hasn’t been impacted ... 6 days ago | 15 mins Case study: Data protection trends and ransomware defense in the real world Cristophe Bertrand | Colm Keegan | Saurabh Sensharma | Rob Petrone Data continues to grow in scale and importance for companies of all shapes and sizes. As it does, so too does the imperative to protect it. Threat act... 6 days ago | 50 mins How Mature Behavior Analytics Accelerates Detection of Persistent Threats Sanjay Raja, VP Product Marketing and Solutions, Gurucul Many solutions that have some threat detection and response capabilities, such as SIEM and XDR, are claiming to add User and Entity Behavior Analytics... 6 days ago | 36 mins How to resolve your data security challenges Steven Stone, Head of Rubrik Zero Labs, Rubrik and Scott Bekker, Webinar Moderator, ActualTech Media 92% of IT and security leaders are concerned they won’t be able to maintain business continuity if they experience a cyberattack in the next year, acc... April 4, 2023 11:00am PAM Parity: Replacing Your Legacy Endpoint Privilege Management Solution Quickly Jeremy Moskowitz (CTO and Founder of PolicyPak, now part of Netwrix), Martin Cannard (VP of Product Strategy at Netwrix) Is your legacy tool for endpoint privilege management EOL'ing soon? Are you looking for a cost-effective replacement that provides feature parity and ... April 5, 2023 9:00am Load more