Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Managing the Cybersecurity Supply Chain Risk in File Transfers Kym Welsby, Regional Director at Fortra Every organization is exposed to cybersecurity risk through its supply chain. This could be suppliers of parts, service providers, customers, or distr... 3 weeks ago | 60 mins Managing the Cybersecurity Supply Chain Risk in File Transfers Kym Welsby, Regional Director at Fortra Every organization is exposed to cybersecurity risk through its supply chain. This could be suppliers of parts, service providers, customers, or distr... 4 weeks ago | 60 mins Simplify Backup, Lower Cost & Boost Ransomware Protection w/Veeam v12 & Cloudian Stephen Firmes, Sr. Solutions Architect, Veeam | Amit Rawlani, Sr. Director of Alliances and Solutions, Cloudian Cyber-attacks continue to evolve. With Veeam v12, Veeam and Cloudian have simplified the data protection architecture to make ransomware protection si... 3 weeks ago | 55 mins Zero Trust Series: 5 Customer Experiences with Data Access Governance David Condrey, Doug Ouzts, and Buck Gashler, Data Access Governance, OpenText Data Access Governance is a market segment that focuses on identifying and addressing threats that can come from inappropriate access to sensitive and... 1 month ago | 58 mins Secure File-Sharing Collaboration: Improving Your Cloud-First Security Posture Julian Fay, CTO, Senetas; Stan Mesceda, Sr. Mgr. Product Management, High-Speed Encryption Data sovereignty in the cloud is growing concern, brought to the fore by regulations such as GDPR, and the Schrems II ruling. With more organizations’... 1 year ago | 47 mins Security with SURGe: Analysis of 10 Major Ransomware Strains Mick Baccio, Shannon Davis & Sydney Howard Splunk SURGe recently analyzed how quickly ten major ransomware strains, including Lockbit, REvil and Blackmatter, could encrypt 100,000 files. The en... 8 months ago | 43 mins How Automated Encryption Delivers Improved Privacy, Protection, and Compliance Marcel Mock (totemo CTO), Jérôme Bei (Kiteworks Global Technology Director), Bob Ertl (Kiteworks Sr Director Industry Groups) Research shows that organizations struggle to protect and demonstrate compliance for sensitive email content communications. They lack comprehensive a... 1 year ago | 36 mins Secure File-Sharing Collaboration: Improving Your Cloud-First Security Posture Julian Fay, CTO, Senetas; Stan Mesceda, Sr. Mgr. Product Management, High-Speed Encryption Data sovereignty in the cloud is growing concern, brought to the fore by regulations such as GDPR, and the Schrems II ruling. With more organizations’... 1 year ago | 45 mins Security with SURGe: Analysis of 10 Major Ransomware Strains Mick Baccio, Shannon Davis & Sydney Howard Splunk SURGe recently analyzed how quickly ten major ransomware strains, including Lockbit, REvil and Blackmatter, could encrypt 100,000 files. The en... 7 months ago | 43 mins Implementing Secure Access and File Sharing in Slack Corey O’Connor, Director of Product Marketing, DoControl and Orr Semmel, Sr. Product Manager, DoControl Slack is without question one of the best collaboration tools in the market to help bring the right people, information, and tools together to get wor... 11 months ago | 50 mins Load more