Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date The Rise of Containers: Tackling the Security Challenge Anil Badruddin, GuidePoint Security | Tim Chase, Lacework | Matthew Girdharry, AWS Marketplace For all that containers promise, they still raise some concerns in the security space. Containers have enabled new levels of scalability and flexibili... August 30, 2022 5:00pm The Evolution of Pen Testing Victor Wieczorek, VP AppSec and Threat & Attack Simulation In this presentation, we take an extensive look at the ecosystem of Penetration Testing: --Market size and growth rates --Real-world explo... 2 months ago | 36 mins Trellix Endpoint Security 10.7 Best Practices Tanja Hofmann - Senior Security Engineer, Trellix & Konstantin Berger - Senior Security Engineer, Trellix Im Zuge von Home-Office, Cloud-Anwendungen und Zero Trust-Ansätzen spielt der Endpoint bei der Sicherheitsbetrachtung eine zentrale Rolle. Hacker find... 3 months ago | 61 mins IT-Security Strategien vor und nach Cyberangriffen Dell Technologies, VMware, & Secureworks Wie man eine höhere Ausfallsicherheit erzielt bei zunehmenden Cyber- und Ramsomware-Angriffen. Cyberangriffe nehmen immer weiter zu und haben immer sc... 8 months ago | 105 mins Are we SAFE on the Internet? #cybernotes senhasegura In celebration of the international cybersecurity month, check out cyber notes, our short video series on cyber security. In this first video, we spl... 9 months ago | 2 mins Innovation and Security: Can We Have the Both? #cybernotes Marc Goodman and Marcus Scharra, CEO of senhasegura Could the constant search for inovation disrupt the security of technological devices? Or will the great need for security slow technological progress... 9 months ago | 3 mins How can digital law support the change from on-site to remote work? #cybernotes Marcus Scharra, CEO of senhasegura In this new cyber notes episode, Dr. Patrícia Peck tells us about how digital law can provide legal support for the changes from in-person work to rem... 8 months ago | 3 mins How to Balance the Power of Users on the Internet? #cybernotes senhasegura In the second video of the Cyber Notes Series, Marc Goodman, the author of the book Future Crimes, talks about what the role of users on the Internet ... 9 months ago | 2 mins Zero Trust Visibility and Security Greg Copeland Director, Business Development Keysight Technologies and David Batty, Principal Enterprise Solutions, FireEye Zero Trust is a response to trends such as BYOD and cloud assets not located within the well-defined permitter of an enterprise owned boundary. No imp... 10 months ago | 38 mins Polymorphed vs Unpolymorphed Rui Maximo, Director of Solutions Engineering See an unprotected system fail and a polymorphed system succeed in protecting Linux against memory based attacks. 2 years ago | 8 mins