Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date The missing story with every cloud breach—and what you need to know and do Josh Stella, Chief Architect, Fugue a Part of Snyk When the headline reads “Company suffers cloud data breach due to misconfigured server,” recognize that this is only a small part of the story. What’s... 3 weeks ago | 62 mins Tutorial 5: Stds Devlpmt at a glance - Part 1 - Technical Organization ETSI, Adrian Scrase Tutorial 5: Standards Development at a Glance - Part 1: Technical Organization 6 months ago | 13 mins Modernizing Supply Chain Cybersecurity Via Multi-Signal Threat Investigation Ryan Westman, Mgr,Threat Intell,eSentire;Paul Tobia, Sr. Security Product Mgr, Sumo Logic; Brandon Dunlap, Moderator In the last year alone, the number of supply chain attacks has grown exponentially as they offer threat actors stealthy, scalable, and privileged acce... 7 days ago | 59 mins Getting started with Kubernetes, Part 1: Introduction to YAML Nick Chase, Mirantis, Director, Technical Marketing and Developer Relations Any modern web development, particularly when it comes to Kubernetes, is going to involve some work with YAML files. These files are used for configur... 5 months ago | 59 mins Using Data Science to Accelerate Early Drug Discovery with Bayezian and Dataiku 1.) Ossama Shafiq, Clinical Data Scientist @ Bayezian, 2.) Kelci Miclaus, Director of AI Industry Solutions @ Dataiku Join us on this 3 part series where we take you through our production journey. Drug development is a lengthy, complex and costly process, entrenched ... 2 months ago | 59 mins Getting started with Kubernetes part 2: Creating K8s objects with YAML Nick Chase, Mirantis, Director, Technical Marketing and Developer Relations In part 1 of this series, we looked at the basics behind YAML. Now we're going to take that knowledge and use it to create actual Kubernetes objects ... 5 months ago | 60 mins Operationalizing Your Public Cloud Part 1: Gain Complete Visibility Shrivatsa Upadhye, Senior Technical Marketing Architect, VMware Do you feel like your public cloud costs are increasing drastically, but you don't have complete visibility into where and why? In this session, we'l... 9 months ago | 28 mins Web vs. Content Analytics: Measuring The Metrics That Matter for Product Content Fabrice Lacroix, CEO of Fluid Topics Not all Analytics are created equal – nor do they all serve the same purpose. Web analytics are helpful for marketing content, but when it comes to pr... 3 months ago | 62 mins How to Stop Freaking Out about Too Many Vulnerabilities (Part 2) Nathan Wenzler, Technical Director, Tenable AND Seth Matheson, Principal Security Engineer, Tenable As a follow-up to Part 1, this webinar Tenable experts, Seth Matheson and Nathan Wenzler, show you how Tenable helps overcome the challenges of having... 10 months ago | 62 mins It May Be Time to Stop Freaking Out About Too Many Vulnerabilities (Part 1) Nathan Wenzler, Technical Director, Tenable AND Seth Matheson, Principal Security Engineer, Tenable There are two core challenges impacting most vulnerability management programs: too many vulns already(!) AND incomplete coverage across your entire a... 10 months ago | 62 mins Load more