Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Australian Institutions targeted by Hacktivist Groups: How to Stay protected Pascal Geenens, Director, Cyber Threat Intelligence | Ron Meyran, Senior Director, Corporate Enablement Over 100 Australian sites have become a prominent target for hacktivist attacks — including the public websites of governments, airports, healthcare, ... 3 days ago | 41 mins Australian Institutions targeted by Hacktivist Groups: How to Stay protected Pascal Geenens, Director, Cyber Threat Intelligence | Ron Meyran, Senior Director, Corporate Enablement Over 100 Australian sites have become a prominent target for hacktivist attacks — including the public websites of governments, airports, healthcare, ... April 12, 2023 1:00pm Open Source Risks with New Technologies: AI, GitHub Copilot, Blockchain & More Mark Radcliffe, DLA Piper, Anthony Decicco, GTC Law Group, Sam Ip, Osler, Hoskin, & Harcourt The evolution of newer technologies, like artificial intelligence, machine learning, GitHub Copilot, blockchain, cryptocurrencies, DeFi, APIs, contain... 1 week ago | 61 mins Enabling the Enterprise with Private Wireless and Edge Computing Solutions Bob Laliberte, Principal Analyst (ESG); Ken Byrnes, Global Head, Telecom Line of Business (Dell Technologies) Across industries and use cases business leaders are poised to deliver enhanced and new experiences by implementing private wireless and edge computin... April 19, 2023 2:00pm How to Establish Automotive Fuzz Testing? John McShane, Senior Product Manager | Nico Vinzenz, Cybersecurity Expert | Daniel Teuchert, Application Security Engineer Fuzz testing is effective in uncovering vulnerabilities and robustness issues in automotive products. The results are improved development times and l... 1 month ago | 51 mins Getting Started with Hadoop Migration and Modernization Kamran Hussain, Field Solution Architect, Dremio, Tony Truong, Sr. Product Marketing Manager, Dremio Most companies use Hadoop for big data analytical workloads. The problem is, on-premises Hadoop deployments have failed to deliver business value afte... 6 hours ago | 43 mins Making cyber-threat intelligence programs effective and impactful Jon Oltsik- Distinguished Analyst & Fellow with Enterprise Strategy Group & TJ Alldridge- Product Marketing Manager, Mandiant Most organizations have cyber-threat intelligence programs in one form or another, but the tough-to-face fact is that many only achieve tactical succe... 1 day ago | 32 mins Powering the Cloud with Artificial Intelligence & Machine Learning Jo Peterson, VP of Cloud and Security Services at Clarify360 Cloud adoption has been scaling consistently for years, but the emergence of new AI capabilities is transforming what’s possible with cloud computing.... 2 days ago | 45 mins F5 and AWS: Protect your APIs and Guard Against Automated Threats Jerald Cheong, Solutions Architect F5 & Ram Cholan, Senior Solutions Architect, Edge Services, Amazon Web Services Rapid application updates, third-party APIs and malicious bots expose your businesses to risk. Organizations are looking for secure, reliable, perform... 22 hours ago | 49 mins The Rapid7 Annual Vulnerability Intelligence Report [EMEA] Caitlin Condon, Erick Galinkin and Ron Bowes from the Rapid7 Research team Rapid7’s Vulnerability Intelligence Report is an annual research report that highlights CVE exploitation trends, explores attacker use cases, and offe... 2 days ago | 61 mins Load more