Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Five SOC Modernisation Stories: How Splunk customers have elevated their SOC Kirsty Paine, Ana Arruda, Le-Khanh Au, Lars Wittich, Drew Gibson, and Matthias Maier On average, organisations have more than 30 security solutions in place and continue to evaluate, acquire and implement more. Each solution produces a... July 12, 2022 12:00pm Unpacking Endpoint Detection and Response John Bruggeman, virtual CISO at CBTS ; Steve Cobb, CISO at One Source Communications As the methods and practices used to attack digital assets become more refined, the security tools to combat the threats must evolve, shifting from re... July 19, 2022 3:00pm How National Grid gains rich attacker insight from Threat Response alerts Frank Furlo, Principal CSIRT Analyst, National Grid and Scott McCarthy, Senior SOAR Engineer, National Grid Alert fatigue and desensitization, high false-positives, confirmation bias...sound familiar? One-for-one alerting models come with a lengthy list of c... July 18, 2022 2:00pm Wrangling Mobile Device Inventory Michael Durrant, Director, Solution Architects Managing and Securing Mobile devices throughout their lifecycle can be challenging. However, devices that go lost and stolen without immediate attenti... 2 weeks ago | 36 mins Beyond Log4j: Preparing for Supply Chain Risk Charles Ross, Chief Customer Officer, Tanium The Apache Log4j vulnerability, first reported in December 2021, put millions of devices at risk and was quickly established as one of the worst, most... July 20, 2022 2:00pm Data is Not the New Oil: Measuring the Value of Your Information Doug Laney, Author and Steve Totman, Chief Strategy Officer at Privitar Many senior executives talk about information as one of their most important assets, though few behave as if it is. The majority of organizations will... July 7, 2022 3:00pm Linux Polkit Bug: How Tanium Streamlines Patch Management David Mkrtchian- Head of Portfolio Strategy, Tanium Polkit allows an attacker to elevate to root privileges on virtually any Linux system. That means if you’re running Unbuntu, Debian, Red Hat or CentOS... August 4, 2022 2:00pm The Importance of Maintaining an Accurate Asset Inventory across the xIoT Brian Dunphy, Vice President, Product Management at Claroty The modernization of industrial environments around the globe is linking asset connectivity to the heart of what sustains everyday life. As assets wit... July 27, 2022 5:00pm Supercharging SaaS Applications: The Foodics Story Mohammed Radwan Head of Engineering, Foodics Domenic Ravita VP, Product Marketing, SingleStore SaaS innovator Foodics revolutionizes the way companies and restaurants handle real-time reporting, inventory management, order submission and employe... July 27, 2022 1:00pm The Secrets to Delivering Flexible Fulfillment Ramon Ray Entrepreneur | Tim Kauer, Director of Inventory Planning, Chubbies | Johnny Than, Principal and CEO, Appficiency Consumer businesses are living in a hypercompetitive environment, your customers have high expectations and your inventory management system needs to ... 4 weeks ago | 45 mins Load more