Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to Leverage Threat-Informed Defense in Your Environment Mike McPhee - Cybersecurity Architect - Cisco Normally agility and innovation are good things. Unfortunately, adversaries have taken these traits to heart, leaving security operations overloaded a... August 24, 2022 12:00pm Through the Eyes of the Wolf: Insights into the Chain of Cyber Threats Stevan Sheely, Technical Solutions Architect, Cisco The once-upon-a-time security architecture that was just a stack of controls at mostly a point in the network for different security vectors is a meth... 5 days ago | 51 mins Getting to Know SASE: Part 1 Kevin Beaver, CIISP, Independent Information Security Consultant, Principle Logic LLC As CSO Online explains, “Edge is the concept that moves computing from a centralized model to a decentralized one, away from datacenter consolidation ... 2 months ago | 16 mins Secure SD-WAN: Connect and protect your hybrid work to multicloud applications Steve Harrison, TME Manager, Meraki. Prashant Tripathi Chief Architect SD-WAN, Viptela In a hybrid environment with data everywhere, delivering secure access to applications and data is your most critical challenge. What does it take to ... 2 months ago | 60 mins Getting to Know SASE: Part 1 Kevin Beaver, CIISP, Independent Information Security Consultant, Principle Logic LLC As CSO Online explains, “Edge is the concept that moves computing from a centralized model to a decentralized one, away from datacenter consolidation ... 4 weeks ago | 16 mins Driving Security Resilience in an Ever-Changing World Ankur Chadda - Leader, Product Marketing, Cisco We all know that avoiding cyberattacks one hundred percent of the time is unrealistic. Our networks have become too complex and dispersed to catch eve... August 17, 2022 12:00pm Diving Deeper into SASE: Part 2 Kevin Beaver, CIISP, Independent Information Security Consultant, Principle Logic LLC A recent report from AT&T found that Private 5G and cloud were cited as the preferred edge network. And yet almost three-quarters (74%) of companies s... 3 weeks ago | 19 mins Cut Through Cybersecurity Complexity by Converging Key Capabilities at the Edge Derek Brink, Aberdeen Cybersecurity Analyst A rise in remote employees and an increased reliance on SaaS applications create new, wider gaps in security. It’s more challenging to protect users a... August 31, 2022 12:00pm Using Python 3 in the UEFI Shell for Platform Security Analysis Aaron Frinzell, Nathaniel Mitchell, Sara Batllori, Dan Scott; Intel Corporation; Security Researchers EDK2 has accepted a port of Python 3.6.8 that can be used in the UEFI Shell. Chipsec has adopted it and it can now be used to run Chipsec's suite of t... August 16, 2022 3:00pm Accelerating Incident Response with Customization and Automation Ryan Gurr, Sr. Cyber Threat Hunter When you’re responding to a cybersecurity incident, every second counts. Using forensic data analysis, SOC teams need flexible tools that provide the ... August 17, 2022 3:00pm Load more