Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Using the Pure Portal to Showcase and Discover Faculty Expertise Doug Picadio, Pure Product Manager and Rachel Dresbeck, Director, Research Communications & Development Services, OHSU Elsevier’s Pure gives your faculty and their research global exposure through the Pure Portal. The Portal hosts searchable, open web profiles that mak... 6 years ago | 44 mins The Use of Multi-species Organoids Dr. Valentina Ubertini Title: The Use of Multi-species Organoids as a Pre-clinical Screen to Assess Gastrointestinal Toxicity The small intestinal organoid model (Sato, et ... 3 years ago | 47 mins CISO Challenges and Tips for a More Secure Enterprise Terence Jackson, Rudolph Araujo, Jeffrey Carpenter, Masha Sedova What are the key challenges CISOs are facing in 2019? Security leaders and practitioners are struggling to secure their organizations on a limited bud... 4 years ago | 43 mins Crouching Miner, Hidden Exfil: The Saga Continues Troy Kent, Threat Researcher, Awake Security Everyone talks about alert fatigue and the unfortunate reality of overworked and undertrained analysts. What happens though when attackers start to fo... 4 years ago | 34 mins #PRCN2019: Improving Datasets in Pure Dimitri Unger, Vrije Universiteit, Amsterdam, Netherlands. Reingis Hauck, Leibniz University, Hannover, Germany The status of datasets within research has become more prominent, which is apparent by the increased adaptation of the FAIR principles. It has become ... 4 years ago | 19 mins Battling the Rapidly Evolving Threat Landscape: Practical Insights Diana Kelley - CTO & Founding Partner, SecurityCurve and Bret Settle - Chief Strategy Officer at ThreatX AppSec is entering a new era. Organizations are continuing to accumulate security debt and are facing a 35% rise in cybersecurity attacks due to the f... 1 year ago | 47 mins Remote Access Tools: The Hidden Threats Inside Your Network David Pearson, Principal Threat Researcher, Awake Security Many remote access tools are used legitimately and not considered malware. However, these tools actively bypass network controls, obscuring which part... 4 years ago | 24 mins #PRCN2020: The best gets better: Scopus data quality, measured Mohan Paturi, Mohan Paturi, US and Andrey Loktev, Elsevier, Netherlands An overview is provided of how technology and a Quality Management Framework is being employed to measure and further improve data quality in Scopus. ... 3 years ago | 17 mins Making the IR Work for your Context, CCT College Dublin: A Case Study Marie O'Neill and Justin Smyth, both of CCT College Dublin A small team at CCT College Dublin was given a very big goal. A new IR and faculty profiling tool from Digital Commons was provided to enable strategi... 3 years ago | 58 mins Threatscape 2022: Cyber Attack Prevention Michelle Drolet | Kelvin Murray | Paul Prudhomme | James Johnson As organizations face several different challenges in 2022 and beyond, preparing for a cyber attack is as important as ever. Businesses face a myriad ... 2 years ago | 53 mins