Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Security Resilience in a Hybrid World Sean Earhard, Director of Sales Business Development, Cisco and Krystal James, Sales Business Development Manager, Cisco Security resilience is confronting a new world where everyone and everything is connecting. Businesses are operating as integrated ecosystems with bou... 2 days ago | 23 mins Dell Technologies on Equinix Metal: Digital Advantage As a Service Mark Bowker, ESG | Tony Nelson, Dell Technologies | Zach Smith, Equinix Ongoing global circumstances from continuous supply chain delays to growing concerns around climate change are forcing organizations to rapidly shift ... 2 days ago | 45 mins Russia and Ukraine: beyond the fog of war III N/A Three months since Russian forces invaded Ukraine, the conflict shows no immediate signs of ending. We know that there have been significant, global m... July 5, 2022 9:00am How Blockchain is Driving Transparency Across the Supply Chain Jolanda Kooi - tex.tracer Bart Westerman - tex.tracer Gunjan Bassi - IDC Frederik De Breuck - Fujitsu According to an IDC survey, 61% of the European manufacturers increased their spending on technology associated with sustainability programs in 2021. ... July 21, 2022 1:00pm 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... July 7, 2022 9:00am An Ecosystem Approach to Investing with KARS UCITS ETF Anthony Sassine, Xiaolin Chen From Elon Musk’s Twitter takeover bid to global supply chain disruptions and an equity market downturn, 2022 has not been a quiet year for the electri... 2 weeks ago | 64 mins Reinventing MDR With Identity Threat Protection (EMEA) Ryan Romagnolo (Senior Intrusion Researcher, Falcon OverWatch), Craig Sohn (Sr. Analyst, Falcon Complete) Identity is the front line in the battle against modern cyber threats. Nearly 80% of cyberattacks leverage compromised credentials to gain access and ... 1 week ago | 36 mins Zero Trust Segmentation: The Key to Cyber Resilience Raghu Nandakumara, Head of Industry Solutions at Illumio | John Grady, Senior Analyst at ESG If cyber threats are keeping you up at night, you’re not alone. New research by analyst firm Enterprise Strategy Group found that 76% of surveyed orga... 1 week ago | 40 mins Software Supply Chain: Backdoors to your application hiding in plain sight Eran Orzel, Co-Founder, Argon an Aqua Security Company Supply chain attacks have been the trending topic of the year. But how are attackers actually breaching software supply chains? What is the real sour... 1 day ago | 45 mins Fireside chat with BitSight: A view from Infosecurity Europe on Security Ratings Richard Wall, Sales Director UKI, and Alfonso Hermosillo, Senior Consulting Engineer EMEA Infosecurity Europe came back strong this year in London as a face-to-face event, and BitSight wouldn't miss this opportunity to show once again the v... 6 hours ago | 11 mins Load more