Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to Perform Effective Web Application Security Assessments Leanne Shapton - Portswigger, Joel Noguera - Hacker & Pentester, Cindy Ho - HackerOne Security reviews and assessments can take a lot of effort and still not provide the results you are looking for, especially in the face of ever-expand... August 23, 2022 4:00pm Proactive IT: How To Prevent Tickets Kelly Calver & John Boardman, Softcat speak to John Cairns, Nexthink If a ticket is submitted, then it’s already too late. Incidents are reaching critical mass and your service desk is stretched thin, leading to wasted ... 2 weeks ago | 22 mins Raise the Bar, Not the Budget Gary Breder, Hitachi Vantara, Director of Product Marketing, Cloud Technology needs can be unpredictable. But your business relies on consistent service. Your infrastructure needs a way to flex with changing requireme... 2 weeks ago | 8 mins Software Supply Chain Security – Best Practices Alex Babar, Erik Bataller & Liav Caspi Attacks to software supply chains are increasing between 3-6x per year and are causing havoc ranging from operational disruption and brand damage, to ... 4 weeks ago | 59 mins Cutting Through the SASE Confusion Futuriom Group and Aryaka Networks One vendor or multi-vendor? SD-WAN and/or SSE? Network and security teams in silos or unified? Thin branch or thick branch? Zero-trust? Remote wo... 2 months ago | 40 mins Assessing the Current State of Thin Client and Digital Workspaces with LG & IGEL Mark Bowker, ESG; Simon Townsend, IGEL; Philip Johnson, LG LG has long been a leader in offering a diverse range of thin client devices for accessing virtual apps, desktops, and digital workspaces. IGEL OS is ... 1 year ago | 59 mins Breaking the Vicious Cycle of Ransomware Incidents Ricardo Villadiego, Founder/CEO, Lumu Technologies; Dr. Chase Cunningham, CSO, Ericom Software; Brandon Dunlap, Moderator As of July 31, 2021, the FBI’s Internet Crime Complaint Center saw a 62% increase in reported ransomware incidents and a 20% increase in reported loss... 4 months ago | 58 mins Data Protector Tips and Tricks: Deduplication best practices Marc Fisseler, EMEA Data Protector Sales Engineer, Micro Focus The explosion of data are turning organizations to data deduplication solutions to maximize the utilization of resources they have, while reducing cos... 6 months ago | 58 mins How to find, win and keep your customers for future growth and success Benito Nicholas Pereira, Sales Manager, Salesforce | Michael Cheng, Lead Engineer, Salesforce | Raymond Lee , COO, V-Key As you start implementing your plans for 2022 it's time to re-evaluate if your process is helping drive growth or slowing you down. For small and medi... 4 months ago | 94 mins Forcepoint’s Trusted Thin Client & Trusted Thin Client Remote Solution Sharpener Victor Martinez, Senior Cyber Engineer, Forcepoint In this edition of Forcepoint’s GovCyber Solution Sharpeners Series, Victor Martinez, Sr. Cyber Engineer at Forcepoint discusses our Raise the Bar- an... 2 years ago | 24 mins Load more