Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Cutting Through the SASE Confusion Futuriom Group and Aryaka Networks One vendor or multi-vendor? SD-WAN and/or SSE? Network and security teams in silos or unified? Thin branch or thick branch? Zero-trust? Remote wo... 5 days ago | 40 mins Software Supply Chain Security – Best Practices Alex Babar, Erik Bataller & Liav Caspi Attacks to software supply chains are increasing between 3-6x per year and are causing havoc ranging from operational disruption and brand damage, to ... July 20, 2022 5:00pm Assessing the Current State of Thin Client and Digital Workspaces with LG & IGEL Mark Bowker, ESG; Simon Townsend, IGEL; Philip Johnson, LG LG has long been a leader in offering a diverse range of thin client devices for accessing virtual apps, desktops, and digital workspaces. IGEL OS is ... 1 year ago | 59 mins Breaking the Vicious Cycle of Ransomware Incidents Ricardo Villadiego, Founder/CEO, Lumu Technologies; Dr. Chase Cunningham, CSO, Ericom Software; Brandon Dunlap, Moderator As of July 31, 2021, the FBI’s Internet Crime Complaint Center saw a 62% increase in reported ransomware incidents and a 20% increase in reported loss... 3 months ago | 58 mins Overcoming Imposter Syndrome & Other Secret Struggles Deb Calvert, founder of People First Leadership Academy & People First Productivity Solutions Fear of exposure. Holding back. Not taking risks – even the little ones – because your confidence is shaky. The uncertainty, the feeling that you’re a... 3 months ago | 49 mins How to find, win and keep your customers for future growth and success Benito Nicholas Pereira, Sales Manager, Salesforce | Michael Cheng, Lead Engineer, Salesforce | Raymond Lee , COO, V-Key As you start implementing your plans for 2022 it's time to re-evaluate if your process is helping drive growth or slowing you down. For small and medi... 2 months ago | 94 mins Data Protector Tips and Tricks: Deduplication best practices Marc Fisseler, EMEA Data Protector Sales Engineer, Micro Focus The explosion of data are turning organizations to data deduplication solutions to maximize the utilization of resources they have, while reducing cos... 5 months ago | 58 mins Forrester Total Economic Impact: Forcepoint Cross Domain Solution Findings Steve Turner- Security and Risk Analyst, Forrester Rachel Ballard, Financial & Budgeting Consultant, Forrester’s TEI Forcepoint’s Raise the Bar-compliant Cross Domain suite is in operational use in some of the most stringent environments in the world, securing global... 9 months ago | 55 mins NextGen Security and Risk Strategies: Are You Prepared? Matt McCracken, Principal of Sigma Base Protection Solutions Security operation leaders need to reassess their strategies for addressing corporate security concerns, employee safety and brand reputation. They ar... 4 months ago | 58 mins What is Zero Trust? Eric Cole This episode of Life of a CISO is focused on Zero Trust architecture. What Zero Trust means is that by default, all devices in a network have to be au... 11 months ago | 29 mins Load more