Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date DoControl 101: Modernizing DLP & CASB Corey O'Connor Preventing the loss of sensitive information is still very much top of mind for CISOs and security practitioners. But in today’s reality, technology m... 3 days ago | 35 mins Part 2: Now What? Practical Recommendations for Ransomware Recovery Neil Jones - Director of Cybersecurity Evangelism and Salil Sane Sr. Director Product Management, Data Gov Sec Egnyte Practicing good cyber-hygiene like requiring company-wide multi-factor authentication and managing content sprawl can help to prevent ransomware attac... 5 days ago | 36 mins Part 3: The Future of Ransomware: Get Prepared Now Neil Jones - Director of Cybersecurity Evangelism and Dave Buster Sr. Manager, Security and Governance Egnyte As the number of ransomware attacks on businesses continues to grow, hackers are only getting smarter in their efforts to combat your defenses. If you... May 18, 2022 5:00pm 5 Overlooked Security Capabilities for Compliance in Public Cloud Jigar Shah, VP of Product and Erik Kristiansen, VP of Marketing, Valtix For many organizations, making the move to the cloud also means understanding how to achieve the same levels of visibility and control required of the... 4 days ago | 40 mins Ransomware Refresh: What You Need to Know Neil Jones, Dir, Cybersecurity Evangelism, Egnyte and Salil Sane, Sr. Director PM, Egnyte Ransomware tactics are constantly evolving. When it comes to cyber attacks, it is not a matter of if, but when. Being prepared for the inevitable is a... 6 days ago | 26 mins Ransomware Trends in 2022 Leena Bongale, Manager Data Security, TD Bank Let’s face it, cyberattacks such as ransomware are becoming more common and more complex. The coming 12 months will bring increasingly aggressive cybe... 3 weeks ago | 38 mins Ep 5 - Top 5 Pitfalls to Avoid in Client-Side Security Dor Zakai, Senior Director Solutions Engineering, F5 and Patrick Zoller, Security Solutions Architect, F5 As you secure your applications and protect them from security breaches and fraud events, you've likely turned to preventative and detective controls ... 6 days ago | 60 mins 7 Steps to Better M365 Security: What IT Leaders Need to Know Liam Cleary - Microsoft MVP and M365 Security Expert SharePlicity and Brandon Hurter VP, Product Marketing Egnyte Microsoft 365 is the most commonly used cloud office suite in the world, helping users generate, share, and store billions of files. In order to secur... May 25, 2022 4:00pm Part 1: Debunking Ransomware's Biggest Myths Neil Jones - Director of Cybersecurity Evangelism and Dave Buster Sr. Manager, Security and Governance Egnyte Ransomware is today’s biggest cybersecurity threat for businesses of all sizes. This session will separate ransomware fact from fiction. Ransomware ... 2 weeks ago | 33 mins Privacy by Design: Why Data Privacy & Security Officers Must Collaborate Dr. Eduardo Rocha, GlobalDots | Dr. Anna Schmits, Akamai Technologies When falling into the wrong hands, abuse of user PII can have a devastating effect on the user’s lives and your business reputation. Facing today’s s... 2 months ago | 59 mins Load more