Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Naviguer en toute sécurité dans les eaux troubles des cybermenaces Pierre-François Guglielmi, CTO chez Rubrik Avec l’adoption croissante des solutions cloud, il devient urgent de garantir la disponibilité des données d’entreprise critiques en cas de cyberattaq... June 7, 2023 8:00am The Hidden Potential of DNS in Security Cricket Liu, Ross Gibson and Josh Kuo DNS is a foundational element of network communications and is also the starting point for countless cyberattacks. Threat actors abuse DNS to install ... June 7, 2023 3:00pm Can DNS Security Block Ransomware? Paul Mockapetris, Chief Scientist at ThreatSTOP Any device that reaches the Internet is susceptible to ransomware from the web. DNS security is used to block ransomware and keep your devices safe. W... June 7, 2023 5:00pm Key Findings from the 2023 Thales Data Threat Report Eric Hanselman, Chief Analyst TMT, and Justin Lam, Research Analyst TMT, S&P Global Market Intelligence In this webinar you will get insights into the latest data security trends, threats and emerging topics in the 2023 Thales Data Threat Report. Based o... 12 hours ago | 50 mins Zunesis and Zerto Podcast Series: Podcast 3 Gene Torres - Zerto, Michael Gosselin- Zunesis Ransomware threats to data are increasing, and the consequences are becoming more serious. Today, the impact of not being able to recover successfully... 1 day ago | 17 mins Zunesis and Zerto Podcast Series: Podcast 2 Gene Torres - Zerto, Michael Gosselin - Zunesis For companies facing the potentially costly consequences of downtime, striving to be data-driven means IT priorities must move to a cloud-first strate... 1 day ago | 11 mins Veeam | Microsoft Summit: Secure EMR Solutions for Patient Data Protection Veeam and Microsoft Leaders Learn why Healthcare organizations are adopting secure EMR solutions to protect patient data with VEEAM and Microsoft. The Veeam | Microsoft Healthc... June 8, 2023 4:00pm Ransomware Protection: Across the Attack Surface and Along the Kill Chain David Finger, VP, Product & Solutions, Fortinet and Aamir Lakhani, Senior Offensive Attack Researcher, Fortinet For ransomware operators to successfully encrypt data they first need to deliver code to target devices. In order to find those devices, attackers rel... 1 week ago | 34 mins How Financial Organisations Can Beat Ransomware Attacks Grant Dinning, Sales Engineer at Rubrik Financial organisations are experiencing a huge spike in ransomware attacks. And with unstructured data growing relentlessly, they are faced with limi... 1 week ago | 28 mins Ransomware Protection: Across the Attack Surface and Along the Kill Chain David Finger, VP Product Marketing, Fortinet; Aamir Lakhani, FortiGuard Labs, Fortinet For ransomware operators to successfully encrypt data they first need to deliver code to target devices. In order to find those devices, attackers rel... 1 week ago | 34 mins Load more