Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Protecting Apps and APIs with New WAAP Solution Stephen Archer, Senior Solutions Engineer, F5 and Matthieu Dierick, Solutions Architect, F5 Application security is rapidly evolving in a space where new challenges converge, from supply chain delays to accelerated adoption of digital experie... August 30, 2022 9:00am Through the Eyes of the Wolf: Insights into the Chain of Cyber Threats Stevan Sheely, Technical Solutions Architect, Cisco The once-upon-a-time security architecture that was just a stack of controls at mostly a point in the network for different security vectors is a meth... 1 week ago | 51 mins Is Your Security Engineered To Beat Social Engineering? Matt Aldridge, Principal Solutions Consultant Social engineering tactics – using the art of deception in cyberattacks – have climbed to the top spot as the #1 cause of cybersecurity breaches. Our ... 1 week ago | 44 mins Key Findings from the 2022 Data Threat Report - Federal Edition David Ortega, Principal Solutions Architect, Thales, and Marcelo Delima, Senior Global Solutions Marketing Manager, Thales Navigating Data Security in an Increased Mandate Environment to Protect Critical Assets, Defend Against Ransomware & Accelerate Cloud Transformation I... August 31, 2022 1:30pm Tackling Cloud Waste: How eCommerce Giant Reduced Cloud Costs by $1.4M Annually Steven Puddephatt, Senior Solutions Engineer at GlobalDots FinOps, aka Cloud Cost Optimization, introduces financial accountability to the dynamic cloud spending paradigm, which allows collaborative teams to w... August 31, 2022 9:00am Streamline Supply Chain Operations with Business Intelligence Gowri Selka, Volantsys Analytics | Allison C. Ullrich, Outer | Dave Mendenall, Cradlepoint "Ongoing supply chain and logistic disruptions plagued 2021, with Statistica’s ‘Share of supply chain disruptions worldwide by region 2021’ reporting ... 2 days ago | 61 mins Detection and Response: Neutralising and Minimising Cyber Threats Matt Aldridge, OpenText | Steven Wood, OpenText | Ash Hunt, Sanne In light of evolving cyber risks - from ransomware, to phishing, to social engineering - it is no longer a question of “if?” but “when?” attacks will ... September 1, 2022 9:00am PLAN: Wi-Fi 6/6E Basics - What you need to know to be successful Mike Pennacchi - Network Protocol Specialists, LLC WEBINAR OVERVIEW WITH US AND EMEA TIMEZONES www.netally.com/wifi6-6E-series Just when you thought you knew everything necessary to deploy and maintai... October 13, 2022 12:00pm How to empower hybrid and remote workforce with Desktop-as-a-Service Robert Green, CTO and President, Dizzon, Chris Wittenberg, Director, VMware and James D Wells, Solutions Leader, IBM Work is changing in these times globaly. Anywhere "offices", online meetings in lieu of conference rooms, the “right” to choose a preferred work devi... 5 hours ago | 38 mins MINDHUNTER #5 Meeting the Cybersecurity Needs of the Hybrid Workforce Kanv Khanna, Sr. Solutions Engineer – APJ, SonicWall Anytime access has permanently changed the IT Landscape and hybrid working post-pandemic is now here to stay. Its impact on network and security is ev... 14 hours ago | 21 mins Load more