Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date EDR, XDR, MDR: Filtering Out the Alphabet Soup of Cybersecurity Speakers Mikita Hanets, Industry Analyst, Frost & Sullivan Bud Ellis, Product Marketing Senior Advisor, Secureworks What you’ll learn: Outlining the various solutions in the cybersecurity market Today’s top security challenges The differences between Product (XDR) a... 4 weeks ago | 54 mins Trust Monitor with Duo - An introduction to Risk Management Ted Kietzman, Product Marketing Manager, Cisco This session dives into effectively using anomaly detection to bolster defenses. With algorithms built specifically for evaluating access, Duo filters... August 24, 2022 5:00pm Data Science Festival Heleen Snelting, Director Data Science & Julieta Diaz, Senior Data Scientist In this session, you will learn how to create a customer analytics application using Python, TIBCO Spotfire analytics, and a ready-to-use template. Th... 2 weeks ago | 49 mins Protect Kubernetes Apps from SQL Injection Jenn Gile, Senior Manager of Product Marketing, NGINX You work in IT for a popular local store that sells a variety of goods, from pillows to bicycles. They're about to launch their first online store, bu... September 15, 2022 9:00am LogicHub Security Automation Capabilities Review SANS Institute analyst Chris Crowley Addressing the challenges of overburdened security operations with limited staff and resources, combined with an exponential increase in threats and a... 1 month ago | 62 mins Protect Kubernetes Apps from SQL Injection Jenn Gile, Senior Manager of Product Marketing, NGINX You work in IT for a popular local store that sells a variety of goods, from pillows to bicycles. They're about to launch their first online store, bu... September 15, 2022 4:00pm Adding Web Filter For Multiple Layers of Security at the Network Edge Join Brian Carmichael, Technical Product Manager We’ve recently updated Micro Edge with a new advanced security feature, Web Filter which performs a real-time assessment of URLs and blocks access to ... 5 months ago | 40 mins Know thy Self and thine Enemies Soong Chee, Architect Systems Solutions If you know the enemy and know yourself; - How can you monitor the dark web for your brand? - Do you have exposed credentials? - Are your VIPs being ... 1 month ago | 60 mins Vulnerability Scanning: What Every IT Pro Needs To Know Mark Winter, VP Products and Michael Courtney, Product specialist If you are responsible for IT Security within your own organization, regular network vulnerability scanning is a BASIC procedure recommended by virtua... 2 months ago | 25 mins What is the Future of GPU-Accelerated Analytics? Todd Mostak, , CTO and Co-founder, HEAVY.AI This talk shows how business and government users can create interactive geotemporal dashboards able to render and cross-filter billions of geographic... 2 months ago | 49 mins Load more