Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Using Threat Modeling to Improve Enterprise Cyber Defenses John Pironti, IP Architects president | Terry Sweeney, Dark Reading | Yaniv Bar-Dayan, Vulcan Cyber CEO As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. ... 2 weeks ago | 62 mins Building and Maintaining an Effective Remote Access Strategy Brad Causey, SecurIT360 | Nick Edwards, Menlo Security | Becky Bracken, Dark Reading The COVID-19 pandemic transformed enterprises into remote workplaces overnight, forcing IT organizations to revamp their computing and networking stra... August 31, 2022 2:00am When Bots Attack: Sophisticated Bots & What Enterprise Security is Missing Adam Sell, Sr. Editor @ HUMAN; Gavin Hill, VP of Human Insights @ HUMAN & John Burke, CTO @ Nemertes Research Bots have transformed the way we engage online, efficiently handling a dizzying amount of data and revolutionizing customer service. Yet the success o... August 26, 2022 12:30pm Using Threat Modeling to Improve Enterprise Cyber Defenses John Pironti, IP Architects president | Terry Sweeney, Dark Reading | Yaniv Bar-Dayan, Vulcan Cyber CEO As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. ... 1 month ago | 62 mins When Bots Attack: Sophisticated Bots & What Enterprise Security is Missing Adam Sell, Sr. Editor @ HUMAN; Gavin Hill, VP of Human Insights @ HUMAN & John Burke, CTO @ Nemertes Research Bots have transformed the way we engage online, efficiently handling a dizzying amount of data and revolutionizing customer service. Yet the success o... 2 weeks ago | 49 mins When Bots Attack: Sophisticated Bots & What Enterprise Security is Missing Adam Sell, Sr. Editor @ HUMAN; Gavin Hill, VP of Human Insights @ HUMAN & John Burke, CTO @ Nemertes Research Bots have transformed the way we engage online, efficiently handling a dizzying amount of data and revolutionizing customer service. Yet the success o... September 1, 2022 9:00am The Time Is Now to Add Cloud-Native Network Functions for Both 4G and 5G James Feger, VP & General Manager - Service Provider, F5, and Jim Hodges, Research Director, Cloud Security, Heavy Reading Watch F5 senior leaders and Heavy Reading Research Director Jim Hodges discuss the evolution to cloud-native network functions (CNFs) during this on-d... 3 months ago | 62 mins Monitoring and Securing Remote and Work-From-Home Environments Eric Schwake, Menlo Security | Jason Clark, Independent Security Researcher | Terry Sweeney, Dark Reading In the wake of COVID-19, many IT departments find themselves managing more remote and work-from-home systems than ever before. What does this mean for... 2 months ago | 62 mins Three Emerging Threat Trends and Best Practices to Mitigate Them Oliver Rochford, Applied Research Director & Security Evangelist, Securonix The cyber threat landscape continues to evolve at a breakneck pace, with more and more cyber-attacks leveraging living-off-the-land, fileless, and oth... September 7, 2022 9:30am Jaguar TCS Racing Virtual Garage Tour―NYC, Vertica's Advanced Analytics Platform Mark Whalley, Manager, Vertica Education Jump into the driver’s seat for a first-hand look at what it actually takes to prepare for race day at our Virtual Garage Tour in NYC! Meet Team Prin... 1 month ago | 59 mins Load more