Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Improve MTTR by Using Machine Learning for Alerts Ashutosh Pandey, Senior Product Manager, Freshworks What if we told you that you could reduce noise by 50%? And thereby lower Mean Time To Resolution (MTTR) as well? With ML-powered Automated Grouping f... 5 months ago | 29 mins Closing Security Gaps Across the Cloud and Application Attack Surface Spencer Chin NA, Sales Engineer and John Oltsik, Sr Principal Analyst & ESG Fellow Between rapid cloud adoption and accelerated software development life cycles, organizations need a new security approach across their transforming at... 3 months ago | 50 mins Defending eCommerce from Next-Gen Identity Fraud Dr. Eduardo Rocha, GlobalDots | Mario van Riesen, Shape Security Following the 2020 uptick in eCommerce traffic and offers, automated fraud has become overwhelmingly sophisticated. As they manage to impersonate huma... 4 months ago | 52 mins EMEA Lessons From the Frontlines: Understand Your Ability to Prevent Ransomware Christian Husemeyer, Consulting Sales Engineer, Mandiant; Moritz Raabe, Senior Principal Reverse Engineer, Mandiant Ransomware Series - Part Three. Adversaries behind ransomware are targeting organisations of all size and industries. Ransomware encrypts your critic... August 17, 2022 9:00am Cybersecurity Resiliency Framework Built on a Foundation of Threat Intelligence Matt Aldridge and Michael Suby Cyber resilience can be an intimidating topic for any business, but the risk of a cyber attack is higher than ever. It is critical for companies to ta... August 18, 2022 4:00am Cloud-Based Security Solutions for Advanced Threats Heath Parrott, Sr. Solutions Architect, F5 | Shawn Brady, Head of Global Alliance, AWS A recent study discovered that over half of all data breaches were the result of attacks on web applications. In order to keep up on these sophisticat... 6 days ago | 41 mins DAST to the Future Jeff Lawson, Product Management | Patrick Carey, Product Marketing Shifting the Modern Application Security Paradigm The emphasis on securing applications in development has not resulted in the reduction of breaches ... August 23, 2022 6:00pm Designing and Conducting Decentralized Dermatology Trials Premier Research Implementing rigorous assessments and securing the highest quality of data are major goals in dermatology clinical research. Traditional clinical tria... August 25, 2022 4:00am Abnormal Demo Day: Watch How We Block Socially-Engineered Attacks Gabe Rebane, Group Technical Marketing Manager, Abnormal Security Email security has evolved as more organizations migrate to the cloud. Abnormal Security has been at the forefront of this evolution, and we want to g... August 30, 2022 4:00pm Cloud-Based Security Solutions for Advanced Threats James Tin, Senior Director, Security & Fraud Solutions, F5, Binu Balan, APCJ Head, AWS Edge and Media Services A recent study1 discovered that over half of all data breaches were the result of attacks on web applications. In order to keep up on these sophistic... 3 weeks ago | 58 mins Load more