Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Integrated data center management in a new world Jeremy Clute, VP of Business Development, Nlyte Software Over the past year, data center operators have been adjusting to greater scrutiny from the public and governing bodies. This scrutiny has translated i... 4 days ago | 60 mins Improving SOC Efficiency by 450x with Forescout XDR Justin Foster, Chief Technology Officer; Virendra Bisht, Director of Data Science; George McTaggart, Chief Marketing Officer Threat detection and response has become increasingly important, and increasingly difficult, even for seasoned and large SOC teams. Current approaches... March 28, 2023 3:00pm Innovation Showcase Ep.2: A standard approach to custom SOC Verizon The security industry knows a large number of terms that all describe managed SOC-based services: MSS, MDR, Managed SIEM, Advanced SOC, etc. Furthermo... 3 days ago | 39 mins Improving SOC Efficiency by 450x with Forescout XDR Justin Foster, Chief Technology Officer; Virendra Bisht, Director of Data Science; George McTaggart, Chief Marketing Officer Threat detection and response has become increasingly important, and increasingly difficult, even for seasoned and large SOC teams. Current approaches... March 29, 2023 10:00am Improving SOC Efficiency by 450x with Forescout XDR Justin Foster, Chief Technology Officer; Virendra Bisht, Director of Data Science; George McTaggart, Chief Marketing Officer Threat detection and response has become increasingly important, and increasingly difficult, even for seasoned and large SOC teams. Current approaches... March 30, 2023 4:30am Effective Ways to Augment Your Microsoft 365 Defence Jennifer Cheng, Cybersecurity strategy, APJ, Proofpoint | Alex Sheppard, Sr Sales Engineer, Proofpoint Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. Default email and cloud se... March 28, 2023 3:00am How Hackers Bypass MFA… And How to Stop Them Cybersecurity Experts from Zimperium & RSA Multi-factor authentication (MFA) is a key component to achieving Zero Trust, as it adds a secondary line of protection before allowing access to netw... 3 days ago | 29 mins Five Reasons Why You Should Make the Shift to Service Monitoring Jared Hensle, Sr. Product Marketing Manager and Patrick Hubbard, Director of Technical Marketing | ScienceLogic When your application is underperforming, what should you do? For years, IT has focused on individual servers, databases, and network devices. But you... March 30, 2023 5:00pm Public Key Infrastructure as a Service vs. Traditional PKI Alon Nachmany, Field CISO, AppViewX While Public Key Infrastructure (PKI) is fundamental to enterprise security, traditional PKI deployments are often complex, expensive and a burden to ... 3 days ago | 35 mins Successfully Securing Industrial Digital Transformation - Part 1 Fortinet & Claroty Operational Technology Experts Digital initiatives are critical to the success of production and operations in every industrial sector, with benefits in customer responsiveness, ass... March 30, 2023 9:00am Load more