Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Why testing is critical to delivering quality analytical and operational data Michele Goetz, VP and Principal Analyst at Forrester Join Tricentis and distinguished guest speaker Michele Goetz, VP and Principal Analyst at Forrester, to learn why automated testing should be a key el... 5 days ago | 31 mins 3 Ways to Prepare Your Site for Black Friday and Increase Revenue Elyse Ault, Key Account Director, Varnish Software and Ish Chavez, Solutions Engineer, Varnish Software Your website’s revenue is directly tied to its performance, especially during critical sales periods like Black Friday. Amazon, for example, sees a 1%... 4 weeks ago | 28 mins Insider Threats Are On the Rise: Insights from The Ponemon Report 2022 Yvette Lejins, Resident CISO, Proofpoint APJ & Steve Moros, Snr Director Threat Detection & Advanced Threats, Proofpoint APJ Insider threats continue to be a significant — yet frequently overlooked — cybersecurity threat within organisations. In fact, in the past two years, ... August 16, 2022 9:00am Supercharge Your Security with Automation John Dominguez | Product Marketing Director, Splunk Philip Royer | Research Engineer, Splunk Drowning in repetitive security tasks? Too many security alerts to triage each day? Can't respond to security incidents fast enough? Stop working hard... 1 week ago | 30 mins Key Findings from the 2022 Data Threat Report - Federal Edition David Ortega, Principal Solutions Architect, Thales, and Marcelo Delima, Senior Global Solutions Marketing Manager, Thales Navigating Data Security in an Increased Mandate Environment to Protect Critical Assets, Defend Against Ransomware & Accelerate Cloud Transformation I... 1 week ago | 50 mins Using Threat Modeling to Improve Enterprise Cyber Defenses John Pironti, IP Architects president | Terry Sweeney, Dark Reading | Yaniv Bar-Dayan, Vulcan Cyber CEO As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. ... 1 week ago | 62 mins The Endpoint Security Alphabet Stew Must Include VM and PM Charles Kolodgy, Adjunct Professor, Rivier University | Principal, Security Mindsets Endpoint Security can either be the first or the last line of defense. From the beginning, it has primarily been accomplished by adding some type of s... 3 weeks ago | 37 mins Key Findings from the 2022 Data Threat Report - Federal Edition David Ortega, Principal Solutions Architect, Thales, and Marcelo Delima, Senior Global Solutions Marketing Manager, Thales Navigating Data Security in an Increased Mandate Environment to Protect Critical Assets, Defend Against Ransomware & Accelerate Cloud Transformation I... August 31, 2022 1:30pm Learn How Layering Increases Credential Security Nancy Kennedy, SR. Product Manager Join us to learn how to increase the security of government credentials by stacking or layering different security technology: - Meet some industry ex... 4 days ago | 39 mins Increase Customer Service Operational Efficiencies by 25% with Conversational AI Michael Kropidlowski, SVP Marketing, Kore.ai The COVID-19 pandemic accelerated the use of digital channels and forced many organizations, including utilities to reevaluate their traditional way o... August 12, 2022 6:00pm Load more