Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Ransomware Roulette: The Evolution of Cyber Insurance for MSPs and Their Clients Joseph Brunsman, Brunsman Advisory Group; Drew Schlussel, Wasabi; Kurt Abrahams, MSP360 Ransomware attacks aren’t going anywhere anytime soon, in fact, they are only increasing daily. Recovering from an attack shouldn’t cost you your bus... March 30, 2023 3:00pm Modern Secure App Transformation with Red Hat OpenShift Kasten K10 Adam Bergh, Kasten by Veeam & Zohaib Khan, Red Hat A recent poll shows 53% of organizations detected a misconfiguration in Kubernetes in the last 12 months, while 55% were forced to delay or slow appli... 6 days ago | 59 mins Secure Every Part of Your Business: Data Protection in 2023 Nick Cavalancia, Conversational Geek | Adrian Moir, Technology Strategist & Principal Engineer, Quest Backup is your last line of defence when it comes to ransomware attacks. You need to ensure your systems, applications and data are protected and also... April 11, 2023 2:30pm Taking Zero Trust to 100%: Best Practices to Support your Journey Alexandra Willsher, Forcepoint | John Leonard, Computing | Anne Cockshott, The Channel Company EMEA Zero Trust is widely regarded as the best approach for protecting organizations, but implementing it is a journey rather than a one-off purchase. The... 6 days ago | 38 mins 7 Steps to Secure Your Kubernetes Cluster Pavel Chistikov, Kasten by Veeam Running and securing Kubernetes clusters in production is a complex process, but it doesn’t have to be. Join Pavel Chistikov at Kasten by Veeam who wi... 2 weeks ago | 57 mins Modern Secure App Transformation with Red Hat OpenShift Kasten K10 Adam Bergh, Kasten by Veeam & Zohaib Khan, Red Hat A recent poll shows 53% of organizations detected a misconfiguration in Kubernetes in the last 12 months, while 55% were forced to delay or slow appli... 2 weeks ago | 59 mins 7 Steps to Secure Your Kubernetes Cluster Pavel Chistikov, Kasten by Veeam Running and securing Kubernetes clusters in production is a complex process, but it doesn’t have to be. Join Pavel Chistikov at Kasten by Veeam who wi... 2 weeks ago | 57 mins Putting Zero Trust into Action to Secure the Hybrid Workforce Mike Crouse, Director, Enterprise User & Data Protection, Forcepoint | Heath Mullins, Senior Analyst, Forrester A fireside chat with guest speaker, Forrester Senior Analyst Heath Mullins As we transition from a remote to a fully mobile, hybrid workforce, organi... 1 month ago | 59 mins Las Vegas secures a connected ecosystem with a modern approach to access control Michael Sherwood, Chief Innovation and Technology Officer, City of Las Vegas 55% of the world’s population lives in urban areas, with 68% projected to live in urban areas by 2050. As such, cities represent perhaps the most impo... March 28, 2023 4:00pm Tech Talk: Software Supply Chain Security Marco Palella, Sales Engineer, Zilla Security In this highly informative talk, Zilla Sales Engineer, Marco Palella, discusses how the software supply chain gets exploited by malicious actors and w... 12 hours ago | 12 mins Load more