Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Supercharging the Security of Your Microsoft Email Environment Matthew Pascucci, Director of Security Operations at Evercore We’re bringing a group of experts to talk about the benefits of joining forces between machine learning and threat intel to bring you closer to becomi... 2 months ago | 42 mins Stop Network Intrusion Attacks with BIG-IP SSL Orchestrator and IPS Jay Kelley, Sr. Manager, Product Marketing , F5 | Kevin Gallagher, Product Manager Engineer, F5 With the immense volume of transport layer security (TLS) traffic on the internet, application layer security solutions don’t make a lot of sense with... 3 months ago | 34 mins The whiteboard series: Multi-layered data protection for cyber resilience Druva Ransomware is a growing threat and global costs are increasing. Plus, ransom demands are going up and attacks are becoming more sophisticated. That’s ... 1 year ago | 4 mins The whiteboard series: Multi-layered data protection for cyber resilience Druva Ransomware is a growing threat and global costs are increasing. Plus, ransom demands are going up and attacks are becoming more sophisticated. That’s ... 1 year ago | 4 mins Building Defense-in-Depth Protection Against Phishing Mike Bailey, Product Marketing Manager for Email Security & Brian Reed, Cybersecurity Strategist at Proofpoint Phishing threats are soaring – and getting more sophisticated. Attackers are doing more research on the people they’re targeting, compromising account... 1 year ago | 58 mins Ransomware Defense in Depth: Take Proactive Action by Authenticating Your Email Sara Pan, Sr. Product Marketing Manager & Denis Ryan, Sr. Director of Email Security at Proofpoint Since ransomware has been on the rise over the last year, the United States has seen more than 65,000 ransomware attacks1. It is one of the most activ... 1 year ago | 31 mins Analyst Insight: Too Many Phish in Your Inbox? Your SEG May Be the Problem. Ed Amoroso, Aaron Higbee and Tonia Dudley Phishing continues to be the most successful attack technique used by cyber criminals today. Rules-based “secure” email gateways (SEGs) have become fr... 3 years ago | 49 mins Do you know where your next cyber security threat is likely to come from? Patrick Foxhoven, VP & CTO of Emerging Technologies, Zscaler, Inc. The biggest threat to an organizations cyber security isn't malware, phishing scams or even hackers - it is its employees. According to Gartner Inc, "... 8 years ago | 60 mins A Look into Cisco Umbrella's Secure Internet Gateway Marko Tanaskovic, Technical Solutions Architect at Cisco Umbrella Join us for this webinar: A Look into Cisco Umbrella’s Secure Internet Gateway. This session will illustrate the benefits enabled by cloud-deliv... 2 years ago | 65 mins A Look into Cisco Umbrella's Secure Internet Gateway Marko Tanaskovic, Technical Solutions Architect at Cisco Umbrella Join us for this webinar: A Look into Cisco Umbrella’s Secure Internet Gateway. This session will illustrate the benefits enabled by cloud-deliv... 2 years ago | 66 mins Load more