Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Ransomware: Effective threat response with AWS and Barracuda Brett Wolmarans (Barracuda), Stasia Hurley (Barracuda), Larry Kiger (AWS) Ransomware continues to be a major source of risk—financial, operational, and reputational—to your organization. Today’s ransomware attacks can find a... 3 months ago | 64 mins Securing the Software Supply Chain with Hacker-Powered Security Chris Dickens, Sales Engineer, Kayla Underkoffler, Senior Security Technologist, Alex Rice, CTO & Co-founder, HackerOne HackerOne CTO and Co-founder Alex Rice and Sales Engineering Manager Laurie Mercer dive into how organizations can reduce risk to their software suppl... 3 months ago | 27 mins Multi-Signal Defense Kill Chain: Strengthening Combat Capabilities in Intrusions Keegan Keplinger, Research and Reporting Lead, eSentire; Brandon Dunlap, Moderator Cybersecurity teams are fighting a losing battle trying to keep up with complex business requirements and the expanding attack surface. Although tradi... May 19, 2022 5:00pm Managing the Long Tail of Log4j Danny Connelly, CISO Americas Public Sector, Zscaler & Emily Laufer, Senior Product Marketing Manager Threat Labz, Zscaler If you haven’t done so already, it’s time to buckle in and prepare for the long process of dealing with the Log4j / Log4Shell (CVE-2021-44228) vulnera... 4 weeks ago | 60 mins Agile API Protection: Automated Defense from NGINX Gee Chow, DevOps Specialist, F5 | Brandon Frelich, Security Solutions Architect, F5 APIs are used everywhere and are on track to be the biggest targets for attacks in 2022. As more enterprises adopt Kubernetes for modern app environme... 2 months ago | 37 mins How to Leverage Defense-in-Depth to Survive the Next Log4j Jack Marshal, Senior Director product Marekting, WhiteSource, Aron Eidelman Partner Soultion Architect, AWS How prepared was your firm to handle the Log4j vulnerability that was announced in December 2021? The best firms were prepared and loaded for bear, an... 1 month ago | 47 mins Are You Prepared for the Next Log4J? Ellen Sundra, Forescout CCO; Shawn Taylor, Forescout VP, Threat Defense The Apache Log4j vulnerability took the world by surprise when it was disclosed in December, gaining notoriety for its severity (a CVSS score of 10 ou... 2 months ago | 43 mins How to Leverage Defense-in-Depth to Survive the Next Log4j Jack Marshal, Senior Director product Marekting, WhiteSource, Aron Eidelman Partner Soultion Architect, AWS How prepared was your firm to handle the Log4j vulnerability that was announced in December 2021? The best firms were prepared and loaded for bear, an... 2 months ago | 47 mins AIOps Means Business: IT Innovation for Competitive Edge Valerie O'Connell, Research Director | EMA Research & Leslie Minnix-Wolfe, VP Product Marketing | ScienceLogic IT technical talent, already in high demand, is now at a critical shortfall. The global Great Resignation magnifies the existing talent shortage which... June 2, 2022 3:00pm How Decentralization Defends Against the Top 5 Security Threats John Gleeson, Storj COO and Ingrum Jefferson, Storj Security Systems Engineer In the current climate of high-profile data breaches, rampant ransomware, and a shifting government regulatory environment, development teams are incr... 2 months ago | 54 mins Load more