Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date EDR, XDR, MDR: Filtering Out the Alphabet Soup of Cybersecurity Speakers Mikita Hanets, Industry Analyst, Frost & Sullivan Bud Ellis, Product Marketing Senior Advisor, Secureworks What you’ll learn: Outlining the various solutions in the cybersecurity market Today’s top security challenges The differences between Product (XDR) a... 3 weeks ago | 54 mins Is AI the Panacea to Doing Threat Detection Right? George Anderson - Secureworks, Nash Borges - Secureworks, Rebecca Wynn - Click Solutions Group and Simon Ratcliffe - Ensono The rise of AI has made its way to threat detection. With AI-enabled threat detection systems predicting new attacks and notifying admins of data brea... 2 months ago | 55 mins Integration of Automated Security Tools in CI/CD Pipelines Meera Rao, Senior Director - Product Management (DevOps Solutions) Development organizations continue to implement security earlier in the continuous integration/continuous delivery (CI/CD) pipeline. And the benefits ... 3 months ago | 60 mins ThreatCast Thursday:Answers To Security Questions For Executives, By Executives CEO - William Hutchison, CFO - James Gerber, CRO - Ross Brewer, CTO - Lee Rossey Every executive should have a general understanding of their cybersecurity risk and what it means to their areas of corporate responsibilities. Threat... 2 days ago | 35 mins Fueling a Smarter Pricing Strategy with Causal AI Jerry Stephens, GM, causaLens Organizational investment in pricing and promotions continues to grow, yet 70% of promotions are delivering a negative return. In today’s ever-changin... 1 day ago | 48 mins Making Sense of Zero Trust Josh Green - Duo Technical Marketing Engineer While the concept of zero-trust networking is nearly a decade old, the last few years have seen its popularity in industry discussions grow exponentia... 2 days ago | 36 mins How to Create a 360° Ransomware Recovery Plan James Keating, StorONE Solutions Architect and Ted Oade, Seagate Director, Product 3-2-1 means nothing without a comprehensive plan Losing all or some of your data from a ransomware attack can destroy a business. And even worse, acc... 2 days ago | 58 mins Equity Factors: Value throws a lifeline in the 2022 tumult Mark Barnes, Marlies van Boven, Sandrine Soubeyran, Global Investment Research, FTSE Russell • Which equity factors fared best in last year’s rout? which ones failed? • What industries had the greatest impact on performance in the Q4 rally and... 2 days ago | 31 mins Content without Borders: How Buyers from Different Countries Handle Complexity Dr. Carmen Simon, Chief Science Officer, Corporate Visions & B2B DecisionLabs With the growth of a global economy, conducting business across borders is inescapable. And thanks to the wide adoption of virtual selling, addressin... 2 days ago | 60 mins Can You Trust The Cloud With Your Sensitive Data? Tim Phipps, Cloud Alliances EMEA, Thales Join Tim Phipps as he explores a range of questions IT Security professionals are asking: 1) What is currently driving the demand for putting sensiti... 2 days ago | 54 mins Load more