Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Best practices: how to find network threats effectively using NIDS Tatyana Shishkova, security analyst at Kaspersky Protecting corporate networks is challenging. Large organizations are attacked daily and more often than not, the speed at which you find threats ente... 2 years ago | 30 mins How to find network threats using NIDS Tatyana Shishkova, security researcher at Kaspersky Protecting corporate networks is a challenging task. In this webinar, I will elaborate on Network Intrusion Detection Systems (NIDS) – one of vital co... 3 years ago | 28 mins How to find network threats using NIDS Tatyana Shishkova, security researcher at Kaspersky Protecting corporate networks is a challenging task. In this webinar, I will elaborate on Network Intrusion Detection Systems (NIDS) – one of vital co... 2 years ago | 27 mins Best practices: how to find network threats effectively using NIDS Tatyana Shishkova, security analyst at Kaspersky Protecting corporate networks is challenging. Large organizations are attacked daily and more often than not, the speed at which you find threats ente... 2 years ago | 29 mins Now You See Me, Now You Don't - Ensuring Network Privacy in the Cloud Warren Wu, Senior Director of Product Marketing, Data Center, Fortinet Data centers are being transformed with server virtualization, cloud computing, and software-defined networks. As your business consolidates servers ... 8 years ago | 36 mins Five Lessons in Mobile Security Brian Tokuyoshi, Sr Product Marketing Manager, Palo Alto Networks How to Safely Enable Mobile Devices for Business Use. There’s no question that mobile devices are making an impact to how and where we work. However, ... 8 years ago | 46 mins Stop Mopping...Start Cleaning: New Ways to Improve Your IR Game John Stauffacher, Principal Consultant, Accuvant In the wake of several major commercial breaches "DEFENDING" is the new hot topic. With the changing trends in Information Security, Incident Response... 8 years ago | 59 mins Global CISO Forum Episode 1: Information Security in 2015 Joe Voje, CISO, University of Texas - Pan American and Dan Lohrmann, CISO, Security Mentor A conversation with Joe Voje, looking back at what the effects of a disastrous 2014 will be for 2015 in information security management and an intervi... 7 years ago | 54 mins Best Practices for DDoS Protection Julio Arruda, Sales Engineering Manager, Arbor Networks DDoS attacks have been around for more than a decade, and in that sense they are old news. However, what a DDoS attack actually is has been constantly... 7 years ago | 46 mins Ponemon Institute: The Cost of Time To Identify & Contain Advanced Threats Dr. Larry Ponemon, Ponemon Institute + Arabella Hallawell, VP of Corporate Strategy, Arbor Networks The purpose of our study was to better understand the cyber-security challenges facing financial services enterprises as well as both conventional and... 7 years ago | 57 mins Load more