Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to maintain security in a hybrid work environment Thomas Wingfield, Product Marketing Manager & Molita Sorisho, Product Marketing Mngr & Sanjay Khanna, Product Manager @ Webex Security is paramount today. With people now working from everywhere, your risk surface has expanded. Even if your databases and networks are protecte... 3 days ago | 30 mins Crypto Clarified: Investing in the truth Benjamin Dean, Director - Digital Assets, WisdomTree | Camila Russo, Founder, The Defiant Looking for access to timely, trusted cryptocurrency and digital asset information? Join the next episode of Crypto Clarified: Investing in the truth,... 3 weeks ago | 59 mins Google’s Future of Work Vision from an HR perspective Fiona Cicconi, SVP, People Operations & Chief People Officer, Google Get all the newest insights to help you with your company’s hybrid work transformation. As businesses experiment with new ways of working, the Human ... 1 week ago | 13 mins Crisis and escalation of the threat landscape Pascal Geenens & Daniel Smith, Radware 2021 was a bumpy ride. We started to see an escalation in ransomware and DDoS activity just as organizations accelerated their migration to the cloud ... 3 weeks ago | 70 mins Five SOC Modernisation Stories: How Splunk customers have elevated their SOC Kirsty Paine, Ana Arruda, Le-Khanh Au, Lars Wittich, Drew Gibson, and Matthias Maier On average, organisations have more than 30 security solutions in place and continue to evaluate, acquire and implement more. Each solution produces a... July 12, 2022 12:00pm Rethinking CX: Business Intelligence Solutions for the Retail Industry Gowri Selka, Data Analytics Strategist & Advisor at Volantsys Analytics Forrestor’s “The Future of Commerce Report: Retail Trends for 2022” reports that 50% of consumers purchase items because of personalization based on t... July 20, 2022 4:00pm Fireside Chat : Bringing Trust and Security to Blockchain Joe CAI, Chief Security Officer, HashKey Group; Jeff CHEN, Sales Engineer Manager, Greater China and Korea, Thales Within a permissioned blockchain, transactions are validated and processed by participants that are already recognized by the ledger. Despite this, th... 2 months ago | 48 mins Ransomware Trends: The Evolution of Threat Mike McLellan, Director of Intelligence, Marcelle Lee, Senior Security Researcher, Keith Jarvis, Senior Security Researcher What you’ll learn: The seriousness of the ransomware threat The ransomware landscape post-Colonial Pipeline attack What you can do to defend against r... 1 month ago | 60 mins Fireside chat with BitSight: A view from Infosecurity Europe on Security Ratings Richard Wall, Sales Director UKI, and Alfonso Hermosillo, Senior Consulting Engineer EMEA Infosecurity Europe came back strong this year in London as a face-to-face event, and BitSight wouldn't miss this opportunity to show once again the v... 2 days ago | 11 mins Turbocharge Your Open-Source DB to Drive 100x Faster Performance Domenic Ravita, SingleStore. Praveen Das, Factors.ai. Sarung Tripathi, SingleStore MySQL and PostgreSQL are the most widely adopted and popular open-source databases on the planet. And developers love MySQL and PostgreSQL for their r... July 5, 2022 5:00pm Load more