Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Dismantling Ransomware with Unified Endpoint Management Nick Cavalancia, Conversational Geek | Kent Feid, Quest Software In 2022, on average, there was a ransomware attack every 11 seconds (CyberSecurity Ventures). Given the risk environment, it’s important to stay ahead... February 14, 2023 10:00am Battling Endpoint Cybercrime: Protecting Modern Businesses Nick Cavalancia, Conversational Geek | Kent Feid, Quest Software | Dan Garcia, EDB | Markus Abraham, Independent Consultant The workforce is changing at a rate few can keep up with. The impact of hybrid working, BYOD and IoT can take its toll on your security, open you up t... February 16, 2023 10:00am Getting to Know the F5 Distributed Cloud Platform - Ep 1 Raffaele D'Albenzio Manager Solutions Engineering, F5 and Bart Salaets Senior Director Solutions Engineering, F5 Experience the look-and-feel and get an understanding of the main concepts and building blocks of the F5 Distributed Cloud Services Platform. This Saa... February 22, 2023 10:00am Automotive Cybersecurity: Device Tamper Protection & Secure Over-the-air Updates Priyank Kumar, Senior Director IoT and Payments Utimaco | Alois Kliner VP Automotive and IoT Manufacturing Utimaco Security risks do not commence when the production of the automobile is finalized; they begin at the point of manufacture, where individual components... 2 months ago | 61 mins Applying the Easy Button for API Security - Ep 3 Matthieu Dierick, Solutions Architect, F5 and Mohamed Shaath, Solutions Architect, F5 Gain insights into how F5 Distributed Cloud Services can help you integrate security into the API development lifecycle, ensuring your SecOps-governed... March 8, 2023 10:00am Tech in the classroom: The educator's guide to device lifecycle management Curtis Armstrong, Field Engineer, Jamf Let's be honest. IT admins face unexpected challenges like onboarding new and experienced teachers, introducing new technology, or distributing studen... 7 months ago | 22 mins Securing the Risky Mobile Workforce Matt Woodruff, Enterprise Security Solutions, Jamf Supporting a mobile workforce will take more than just a standard mobile device management program to mitigate threats and provide effective complianc... 4 months ago | 24 mins Apple Enterprise Management for Beginners Kaylee Carlson, Product Marketing Manager Apple, Microsoft and Google all have unique workflows, and no one tool meets the needs of each ecosystem. Which means IT and security teams need a uni... 8 months ago | 27 mins Mobile Threat Patterns Across Australia | 2022 Q4 Analysis Pat Shueh | VP of Solution Engineering, Zimperium Mobile is the unsecured dream frontier for malicious actors targeting critical data and IT systems here in Australia. No matter the device, OS or own... February 7, 2023 12:00am Safeguarding Federal Agency Mobile Applications and Devices Chris Gogoel, Vice President of Program and Product Management & Ilya Dreytser, Head of Customer Engineering Mobile devices are essential to any workplace and have become increasingly vital as more applications allow employees to work and live from anywhere. ... 5 days ago | 32 mins Load more