Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date [Episode - 2] Demystifying the MITRE ATT&CK Framework - Talk show Shehnaaz, Ram Vaidyanathan The episode 2 of this series talks about understanding the various attack launch techniques used by adversaries, according to the MITRE ATT&CK framewo... 1 week ago | 19 mins Making MITRE Matter: Ransomware Defense Revealed Mirza Baig - Senior Product Manager XDR, Michael Rosen - Director Technical Marketing, Rafe Pilling - Counter Threat Unit What you'll learn: MITRE basics – a common language for InfoSec How Secureworks maps adversarial tactics to MITRE to cover over 90% of MITRE ATT&CK TT... June 7, 2022 1:00pm Tips & Techniques for Testing APIs & Services in the Cloud Jeff Peeples, Senior Product Manager Software testing can be time-consuming and challenging. Application testers are often looking for new ways to optimize test creation and execution. Wi... 4 months ago | 44 mins Advanced BI: Harnessing the Power of Machine Learning & AI Gowri Selka, Data Analytics Strategist & Advisor at Volantsys Analytics According to research, as businesses continue to expand their implementation of deep learning technologies, their BI applications will increasingly ce... June 22, 2022 4:00pm 5 Imperatives for Delivering Software With Confidence Arthur Hicken, Chief Evangelist & Matt Klassen, CMO Delivering software fast is good but delivering fast with confidence is better. Leading development groups have figured out five imperatives for impro... 3 months ago | 61 mins Improve Kubernetes Uptime and Resilience with a Canary Deployment Jenn Gile, Senior Manager of Product Marketing, NGINX Your organization is successfully delivering apps in Kubernetes and now the team is ready to roll out v2 of a backend service. But there are concerns ... August 11, 2022 9:00am Get Smart: Use Simulation to Accelerate API Testing Wilhelm Haaker, Senior Solutions Architect How can you improve and accelerate your software testing? If you’re spending most of your time doing UI testing, you may not be reaching coverage or q... 4 months ago | 63 mins Faster Breach Detection Ron Stein, CPacket Networks Breaches happen by clever and well-armed cybercriminals who use many tactics, techniques, and procedures to infiltrate IT infrastructure, implant malw... 3 hours ago | 48 mins Use bad-guy trends, tactics and techniques against them for effective strategy Nick Cavalancia, Founder, Techvangelism The bad news? Data breaches now play a role in ransomware and extortion attacks, espionage, cyber fraud, business-email compromise, and more. The good... May 18, 2022 12:00pm Supporting Modern Applications: Data Management for Speed & Scale Scott Moore, Director of Pre-Sales & Consulting at Semarchy As applications continue to grow in scale and complexity, so does the challenge of supporting them. From geo-distribution to high-volume transactions... 8 hours ago | 58 mins Load more