Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date SecPod's Revolutionary Product Launch to Redefine Cyberattack Prevention Chandrashekhar, CEO ; Preeti, Chief Architect, Director | SecPod The more closely you examine your organization's IT security landscape and deeply understand it, the more confidence you have in your cybersecurity po... February 1, 2023 9:30am SecPod's Revolutionary Product Launch to Redefine Cyberattack Prevention Chandrashekhar, CEO ; Preeti, Chief Architect, Director | SecPod The more closely you examine your organization's IT security landscape and deeply understand it, the more confidence you have in your cybersecurity po... February 1, 2023 4:00pm Enhancing Security Posture in Adherence to Banking Regulatory Compliance Saranga Rajan - Associate Vice President (Endpoint Security), Sujay G.R - Senior Technical Specialist, Chandrashekar Ande BigFix can offer: 1. Secure Inventory Management Are your IT assets spread across locations/geographies that need centralized repository managemen... 2 months ago | 120 mins R22-2 Release Feature Enhancements Dan Roberts, Tufin Solutions Engineering Lead Join members of Tufin’s Product Management team as they share the new features and capabilities available in the latest R22-2 release. From optimizing... 3 months ago | 48 mins R22-2 Release Feature Enhancements Perminder Sahota, Tufin Pre-Sales Engineering Team Leader Join members of Tufin’s Product Management team as they share the new features and capabilities available in the latest R22-2 release. From optimizing... 3 months ago | 48 mins R22-2 Release Feature Enhancements Alex Apt, Tufin Solutions Architect Join members of Tufin’s Product Management team as they share the new features and capabilities available in the latest R22-2 release. From optimizing... 3 months ago | 43 mins Wanted Hacked or Patched: Bug Bounties for Third Party Open-Source libraries Chujiao Ma, Senior Security R&D Engineer, Comcast Open-source software components (OSCs) are used in commercial software development across a slew of industry sectors from communications to finance. B... 4 months ago | 33 mins Using File Analysis to Identify and Respond To Unknown Malware Isaac Dvir, Hallgrímur Björnsson, and Finnbogi (“Bimbi“) Finnbogason, R & D Team at Cyren Upwards of 20% of files not detected by AV engines turn out to be malicious. Because sandbox analysis is slow and expensive, organizations are forced ... 4 months ago | 38 mins Identify Dependable Employees with the Talogy Modular System for Manufacturing Steven Jarrett & Trevor McGlochlin Hiring and developing effective employees is important in any industry, and the manufacturing industry is no exception. Talogy has taken years of expe... 2 months ago | 32 mins The Year Cybersecurity Went Prime Time: 2022 Voice of the CISO Lucia Milică, VP Global R-CISO & Bert Skaletski, R-CISO EMEA & John Checco, R-CISO, FinServe & Ryan Witt, R-CISO, Healthcare In our second annual Voice of the CISO report, Proofpoint surveyed 1,400 CISOs from around the world, inviting them to share their firsthand accounts ... 4 months ago | 61 mins Load more