Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Battling Endpoint Cybercrime: Protecting Modern Businesses Nick Cavalancia, Conversational Geek | Kent Feid, Quest Software | Dan Garcia, EDB | Markus Abraham, Independent Consultant The workforce is changing at a rate few can keep up with. The impact of hybrid working, BYOD and IoT can take its toll on your security, open you up t... February 16, 2023 10:00am 5 Critical Capabilities To Go From Legacy To Modern Endpoint Security [EMEA] Anne Aarness (Sr. Product Marketing Manager), Rachel Scobey (Technical Product Marketing Manager) According to one estimate, there will be 29.3 billion networked devices globally by 2023. Organizations and security teams are facing challenges like ... 2 months ago | 40 mins Effective Ways to Augment Your Microsoft 365 Defences Jennifer Cheng, Director of Product Marketing at Proofpoint Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. Default email and cloud se... 1 month ago | 78 mins Improve Network Security, Reliability, and Hygiene with Unprecedented Visibility Scot Wilson and Kevin Kuhls, Technical Solutions Architects, Forward Networks Enterprise networks are comprised of tens to hundreds of thousands of devices from dozens of vendors running billions of lines of code across a hybrid... 2 days ago | 51 mins Better Together: Why EDR Without MTD Leaves You Vulnerable to Attack JT Keating and Monique Becenti, Zimperium; Rick Bosworth, SentinelOne According to recently published ESG research, “the top 3 reasons security operations are more difficult today than they were two years ago: - The thre... 2 days ago | 39 mins The Critical Infrastructure Threat Landscape and How to Prepare for 2023 Daniel dos Santos, Head of Security Research, Vedere Labs Several events in 2022 shaped the current threat landscape for critical infrastructure, such as the OT:ICEFALL vulnerabilities highlighting how insecu... 3 days ago | 34 mins Open Doors and Lost Keys: Gaining visibility across your external attack surface Todd Carroll, CISO & SVP Global Cyber Operations at CybelAngel Remember the Colonial Pipeline attack? A $2.4M ransom attack disrupted fuel supplies from one of the largest pipeline operators in the United States—a... February 8, 2023 4:00pm The Critical Infrastructure Threat Landscape and How to Prepare for 2023 Daniel dos Santos, Head of Security Research, Vedere Labs Several events in 2022 shaped the current threat landscape for critical infrastructure, such as the OT:ICEFALL vulnerabilities highlighting how insecu... 4 days ago | 34 mins Address Current Public Key Infrastructure (PKI) Challenges in DevOps Asif Karel, Director of Product Management, AppViewX Public Key Infrastructure (PKI) is used by the DevOps team to ensure authentication and encryption throughout the CI/CD pipeline development process. ... 3 days ago | 50 mins Upgrade your F5 Big-IP® or Nginx Devices - with ease Murali Palanisamy, Chief Solutions Officer, AppViewX Upgrading BIG-IP® or Nginx devices to the latest version involves taking backups, restoring the backup file, and updating the configuration. It can be... 3 weeks ago | 35 mins Load more