Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Is AI the Panacea to Doing Threat Detection Right? George Anderson - Secureworks, Nash Borges - Secureworks, Rebecca Wynn - Click Solutions Group and Simon Ratcliffe - Ensono The rise of AI has made its way to threat detection. With AI-enabled threat detection systems predicting new attacks and notifying admins of data brea... 2 months ago | 55 mins AI vs Ransomware: Before, During and After Zach Atya, Director of Insurance at Measured Insurance | Adam Mansour, Chief Security Officer at ActZero Join cybersecurity experts from two AI-powered organizations, Adam Mansour of ActZero.ai and Zach Atya of Measured Insurance, as they discuss the impl... 1 week ago | 60 mins To Kube or not to Kube: When should you use DIY Kubernetes? Paul Whiten, Cloud Services Advocate, Red Hat; Manoj Alaghappan Senior Cloud Services Black Belt, Red Hat Thinking of building your own Kubernetes platform as part of your cloud strategy? How will you manage upgrades, third-party integrations, security, an... 1 month ago | 59 mins Building Microservices with Hazelcast Mike Yawn Microservices is one of the most promising architectural trends right now. For applications that need to move into the cloud, respond to demands for m... 5 months ago | 58 mins To Kube or not to Kube: When should you use DIY Kubernetes? Paul Whiten, Cloud Services Advocate, Red Hat; Manoj Alaghappan Senior Cloud Services Black Belt, Red Hat Thinking of building your own Kubernetes platform as part of your cloud strategy? How will you manage upgrades, third-party integrations, security, an... 5 months ago | 59 mins To Kube or not to Kube: When should you use DIY Kubernetes? Paul Whiten, Cloud Services Advocate, Red Hat; Manoj Alaghappan Senior Cloud Services Black Belt, Red Hat Thinking of building your own Kubernetes platform as part of your cloud strategy? How will you manage upgrades, third-party integrations, security, an... 3 months ago | 59 mins The Egregious 11 — Defending Against the CSA Top Threats Ed Adams, Chief Executive Officer, Security Innovation The cloud carries unique threats. The cloud Security Alliance (CSA) is rapidly becoming the OWASP of cloud security standards. DevOps, containers, mi... 10 months ago | 39 mins The client review process: efficient, effective, engaging Panacea Adviser & Tich Nhau, Business Development Consultant & Glenn Bryant, Marketing, Dynamic Planner During their session, Dynamic Planner will cover how they can help advisers manage their clients remotely and into the future. It will cover: - Accu... 3 years ago | 46 mins [Ep.2] The Rise of Ransomware: Planning for When, Not If Doug Cahill - Senior Analyst, ESG and Bassam Khan - VP of Product and Technical Marketing Engineering at Gigamon Think your backups are a panacea for ransomware defense? Think again. Traditional backups are no longer enough and despite ransomware being a popular ... 1 year ago | 16 mins Using Smart Tools to Accelerate Modernization Rahul Jain, Senior Staff Solutions Architect, VMware and Brian Friedman, Solutions Lead, VMware The benefits of modernizing legacy enterprise application portfolios are clear: cost savings, operational efficiencies, and accelerating time to marke... 8 months ago | 41 mins Load more