Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Cyberstorage and XDR: Threat Detection through a Storage Lens Erin Farr, IBM; Michael Hoard, Intel Cybercriminals have always been about data – stealing data, compromising data, holding data hostage. Businesses continue to respond with malware detec... April 4, 2023 5:00pm Think Like a Hacker [Workshop] Cory Kennedy, Stewart Moody, Carrie Mulcahy Do you want to reduce threat exposure and minimize attack surface? If yes, join SecurityScorecard’s world class threat hunter Cory Kennedy as he shows... March 30, 2023 4:00pm Protecting Digital Assets & Monitoring Risks Outside The Network Shane Sauer, Sr Sales Engineer & Mike Lee, Director, Digital Risk Products & Michael Rutty, Sr Product Marketing Manager Your company’s digital presence is critical to building your brand and communicating with customers, but it can also expose you to digital risk. Bad a... 4 months ago | 34 mins Combating Control Failures: How Can Enterprises Stop Preventable Breaches? Andreas Wuchner - Advisor at Panaseer, Dr Rebecca Wynn - Global CISO at Click Solutions Group and Dom Glavach - CSO, CyberSN There’s no denying that the stress of working in cybersecurity in 2023 is huge. Security teams are dealing with increasingly complex environments, han... 2 months ago | 53 mins Securely Replicate PI System Data Across Segmented Networks Dennis Lanahan, Vice President for Commercial Markets, Owl Cyber Defense Many critical infrastructure organizations have a PI system within their OT network to monitor real time asset values and archived/historical data. Th... 2 months ago | 46 mins Dark Web Monitoring: Best Practices and Use Cases Michael Marriott, Director, Product Marketing Manager Dark web monitoring is not a use case in and of itself. Instead, it encompasses a variety of different use cases such as exposed credential monitoring... 2 years ago | 31 mins Tech Talks IT Edition: Get Monitoring Tricks for All Your *nix Part 2 Robert Gustafson - Consulting Sales Engineer IT Operations & Kaitlin Reynolds, Product Marketing Manager, IT Ops - Splunk Join us for part two of our *nix TA Tech Talk, where we’re focusing on our technical add-on (TA) for Unix and Linux. This TA for *nix makes management... 2 years ago | 27 mins Dark Web Monitoring: Best Practices and Use Cases Michael Marriott, Director, Product Marketing Manager Dark web monitoring is not a use case in and of itself. Instead, it encompasses a variety of different use cases such as exposed credential monitoring... 2 years ago | 31 mins Using the Kea DHCP Server - 5/6. Monitoring and Logging. Carsten Strotmann has 20+ years experience in UNIX systems administration and open source networking applications. This series of six 1-hour webinars presented by Carsten Strotmann will enable a LINUX or UNIX system administrator to successfully deploy the open sou... 2 years ago | 63 mins OWT: The Perfect Solution for Meeting RTB Operational and Audit Requirements Scott Coleman, Shawn Campbell, Brian Romansky According to the latest Raise-the-Bar requirements from the NCDSMO for the U.S. Department of Defense (DoD) and Intelligence Community (IC), any activ... 1 year ago | 30 mins Load more