Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Specialized ITSM for Hybrid Work & Global Teams II: Managing Cloud-Native Apps Francesco Altomare, Regional Sales Manager S. Europe at GlobalDots & Ovidio Maiuri, Chief Digital Officer at Challenger Stone ITSM solutions to manage the productivity, security and compliance of today's work, workforces and workplaces - PART 2 Join us to learn about the cha... May 18, 2022 9:00am Key Findings from 2022 Data Threat Report - Global Edition Eric Hanselman, Principal Research Analyst, 451 Research; Justin Lam, Research Analyst, 451 Research As the pandemic continues to affect both business and personal lives, expectations of a ‘return’ to pre-pandemic conditions have faded from most plans... May 18, 2022 5:00pm Ditt Microsoft 365 Productivity Cloud och den backup det förtjänar Peter Gustafsson [Sr Sales Manager & Country Manager Nordics], Martin Lundblad [Digital Technical Specialist Security] Lyssna på experter från Microsoft och Barracuda för all den senaste informationen och bästa praxis för att använda och säkerhetskopiera dina O365-appl... 6 days ago | 38 mins Crisis and escalation of the threat landscape Pascal Geenens & Daniel Smith, Radware 2021 was a bumpy ride. We started to see an escalation in ransomware and DDoS activity just as organizations accelerated their migration to the cloud ... June 9, 2022 3:00pm Improve Your Security Posture with AI Ramesh Dontha, Digital Transformation Pro | Kumar Saurabh, LogicHub | Patrick Grillo, Fortinet In the last two years, security teams have witnessed unprecedented challenges and threats. In light of these new risks, AI based tools could be the an... 4 weeks ago | 55 mins EDR, XDR, MDR: Filtering Out the Alphabet Soup of Cybersecurity Speakers Mikita Hanets, Industry Analyst, Frost & Sullivan Bud Ellis, Product Marketing Senior Advisor, Secureworks What you’ll learn: Outlining the various solutions in the cybersecurity market Today’s top security challenges The differences between Product (XDR) a... June 16, 2022 1:00pm Key Findings from 2022 Data Threat Report - Global Edition Eric Hanselman, Principal Research Analyst, 451 Research; Justin Lam, Research Analyst, 451 Research As the pandemic continues to affect both business and personal lives, expectations of a ‘return’ to pre-pandemic conditions have faded from most plans... 2 months ago | 58 mins [Replay] Threat Researchers Live - ep 17 - Log4shell (log4j), Amazon Shortage Pascal Geenens & Daniel Smith, Radware --Topics-- Log4Shell, Log4j CVE-2021-44228 Ransomware & RDoS MANGA/Dark.IoT Update Beijing 2022 diplomatic boycott Amazon Outage Cream Cheese Shortag... 4 months ago | 92 mins Why Move to Cloud-Managed Network Services Zeus Kerravala and Cricket Liu With businesses becoming more dynamic and distributed, the traditional on-premises management method has become expensive, error-prone and slow. The C... May 18, 2022 1:00am API Security: Demystifying Risks of the Next Big Attack Vector Replay (APJ) Lebin Cheng, Head of API Security, Imperva and Chris Rodriguez, Research Director, Security and Trust, IDC Managing the security of APIs is one of the key business risks organizations face today as they accelerate the pace of digital transformation. Given t... May 18, 2022 3:00am Load more