Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Is Your Security Engineered To Beat Social Engineering? Matt Aldridge, Principal Solutions Consultant Social engineering tactics – using the art of deception in cyberattacks – have climbed to the top spot as the #1 cause of cybersecurity breaches. Our ... 1 week ago | 44 mins How to Protect Your Digital Business Rafe Pilling, Senior Security Researcher, Counter Threat Unit; Emma Jones, Proactive Incident Response Consultant How to Protect Your Digital Business: 3 Top Success Factors to Securing Your Digital Workforce Watch our webinar to discover the impact digital trans... 3 weeks ago | 64 mins MDR Done Right: 5 things to know Chad Roesle, Director, Product Management, Matt Mills, Security Operations Lead, Bud Ellis, Product Marketing Senior Advisor How to Execute a Winning MDR Strategy • What you’ll Learn: o Top challenges that Managed Threat Detection & Response solves o 5 crucial criteria fo... October 5, 2022 2:00pm Building Boundaries: How to Rein in Cloud Sprawl Alex Hilton - CEO, CIF | Shaun Ward - Claranet | Dan Ortman - SoftwareONE | Adrian Lovell - HPE Cloud infrastructures offer seemingly endless opportunities, but this lack of physical boundaries can create problems if organizations aren’t careful.... 2 months ago | 63 mins Agentless threat hunting: Stopping ransomware before the encryption happens Chris Borales, Sr. Product Marketing Manager - Gigamon Threats are excellent at evading endpoint detection: hiding in network blind spots, operating using encrypted traffic and targeting cloud workloads. A... 1 day ago | 23 mins Accelerating Incident Response with Customization and Automation Ryan Gurr, Sr. Cyber Threat Hunter When you’re responding to a cybersecurity incident, every second counts. Using forensic data analysis, SOC teams need flexible tools that provide the ... 2 days ago | 55 mins Ransomware in 2022: Why SaaS Backup is Crucial Christophe Bertrand, Practice Director at ESG | Tom Keough, Solutions Engineer at Datto Ransomware attacks are becoming increasingly aggressive as hackers ransack data from organizations across industries and forcibly halt operations. Whi... 3 days ago | 30 mins The Endpoint Security Gap: Are you leaving the door open to attackers? Andy Thompson, CyberArk Labs - Brandon Traffanstedt, CyberArk - Richard Breaux, Director, Quanta Services Gartner projects that in 2022, Endpoint Protection Platforms will take the #1 spot in information security software spending, reaching $15.9B and will... 3 days ago | 44 mins Building A Security Compliant Foundation for SAP Juan Pablo Perez-Etchegoyen The NIST Cybersecurity Framework helps organizations assess and improve their ability to prevent, detect, and respond to cyberattacks. SAP’s framework... August 23, 2022 1:00pm Raising the Bar for Identity in Higher Education Kyle Benson, Director of Product Marketing, Saviynt Simplify IT & security for students, staff, and alumni From remote learning to essential resources, today’s institutions rely on a growing ecosystem ... 4 days ago | 51 mins Load more