Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Guiding the IT Buying Journey: Strategies for Partner Marketing Laurie Mitchell, Wasabi; Meaghan Moore, ServiceNow; Amy McNew, Palo Alto Networks and Michael Latchford, TechTarget A recent Enterprise Strategy Group survey found that 53% of IT professionals view IT as more complicated than it was two years ago. With an increase i... 1 day ago | 52 mins Ransomware groups negotiation tactics: what you need to know Marc Rivero, senior security researcher, Global Research and Analysis Team, Kaspersky Cybercriminals tend to be secretive and act without disclosing their identity. However, when it comes to ransomware negotiations, the victim and the a... September 26, 2023 3:00pm The Evolution of Pen Testing Thomas Richards, Principal Consultant Network and Red Team Practice Director Innovate or perish is the only choice available to tech companies. Innovation ensures a constant state of change—new programming languages, systems, a... 4 weeks ago | 29 mins Building Blocks for a Cloud Native Security and DR Strategy Prakash Sinha In this webinar, we will explore the fundamental building blocks required to construct an effective security and disaster recovery (DR) strategy in a ... October 3, 2023 7:00am Building Blocks for a Cloud Native Security and DR Strategy Prakash Sinha In this webinar, we will explore the fundamental building blocks required to construct an effective security and disaster recovery (DR) strategy in a ... October 3, 2023 2:00pm 8 Common Insider Threat Indicators & How to Defend Against Bad Actors Shunta Sharod Sanders What do the latest credential-stealing phishing exploits, theft of trade secrets, and ransomware attacks from Hive, BlackByte, LAPSU$$, and Lockbit3.0... 1 month ago | 21 mins Effectively Managing Security Posture in the Cloud Jason Williams, Palo Alto Networks | Anthony Smith, AWS | Melinda Marks, ESG Enterprise Strategy Group (ESG) research shows that 88% of organizations indicate traditional security methods don’t work well for cloud environments;... 2 months ago | 42 mins Integrate Zabbix & IP Fabric for better network observability Alex Gittings Solution Architect Alex Gittings describes and demonstrates how to integrate your real-time monitoring tool, like Zabbix, with the automated network a... 10 hours ago | 17 mins Network Automation and Muse Domain Orchestration Muse™ Ribbon Communications Muse is a modular suite of applications that lets you get the most out of your network, to create and turn up new services rapidly, and to ensure the ... 24 hours ago | 5 mins Avoid the Perils of Network Configuration Change Claudio Pallais, Senior Content Marketing Manager More than 50% of all network outages and service degradations are due to human error and in specific, configuration change and the unintended conseque... 1 day ago | 21 mins Load more