Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Secure Every Part of Your Business: Data Protection in 2023 Nick Cavalancia, Conversational Geek | Adrian Moir, Technology Strategist & Principal Engineer, Quest Backup is your last line of defence when it comes to ransomware attacks. You need to ensure your systems, applications and data are protected and also... April 11, 2023 2:30pm How Do I Use JWTs Safely? The Do's and Don'ts Ira Cherkes Levinshteyn, Senior Software Engineer JSON web tokens (JWTs) are widely used in authentication processes to transfer information in a JSON format while ensuring data integrity. However, ju... 3 weeks ago | 28 mins How To Protect Your Healthcare Organisation From Ransomware Attacks Kristina Avrionova, Principal Product Marketing Manager at Rubrik, and Zubin Talavaia, Advisory Sales Engineer, Rubrik You are focused on delivering outstanding patient care and delightful patient experience through numerous novice applications and wellness practices. ... March 28, 2023 11:00am Effective Ways to Augment Your Microsoft 365 Defence Jennifer Cheng, Cybersecurity strategy, APJ, Proofpoint | Alex Sheppard, Sr Sales Engineer, Proofpoint Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. Default email and cloud se... 3 hours ago | 78 mins Balancing Cloud Cost and Performance with Fastly and Backblaze Greg Hamer (Sr. Developer Evangelist, Backblaze), Jim Rainville (Sr. Sales Engineer, Fastly) With a global economic slowdown on the horizon, IT and development teams are looking for ways to slash cloud budgets without compromising performance.... March 28, 2023 5:00pm Tech Talk: Software Supply Chain Security Marco Palella, Sales Engineer, Zilla Security In this highly informative talk, Zilla Sales Engineer, Marco Palella, discusses how the software supply chain gets exploited by malicious actors and w... 13 hours ago | 12 mins What´s new in Data Protector 11.03 and Data Protector for Cloud Workloads 5.2 Geoff Rennie, Pre-Sales System Engineer and Partner Business Manager & Troy Drewry, Data Protector Product Manager, OpenText These days, your workers need access to data from anywhere at any time. But providing easy access while complying with security regulations is difficu... 5 days ago | 55 mins Analyzing ISO 27001:2022 Achieve Privacy and Security Compliance with Automation Jitendra Juthani, Dir. of Information Security and Risk, onetrust | Vincent Tham, Senior Solutions Engineer, onetrust Privacy best practices are rooted in security standards such as ISO 27001, the globally recognized and adopted InfoSec framework which was recently up... March 29, 2023 3:00pm A Demo of Vulnerability Risk Management Data Aggregation and De-duplication Tony Taylor, Vulcan Cyber solutions architect | Mike Parkin, Vulcan Cyber engineer Sherlock Holmes said, "It is a capital mistake to theorize before one has data." Enterprise vulnerability management teams know exactly what Sherlock ... March 30, 2023 4:00pm Anomaly Detection and What You Can’t See Craig Chamberlain, Director of Algorithmic Threat Detection & Jeremy Colvin, Technical Product Marketing Manager @ Uptycs What’s the advantage of anomaly detections? Join us this month as in-house expert Craig Chamberlain walks through examples of things anomaly detection... March 28, 2023 5:00pm Load more