Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Oslo Forum - Dell EMC PowerEdge – Grunnmuren i det moderne datasenteret EDVARD EDVARDSEN, SENIOR SYSTEMS ENGINEER, DELL TECHNOLOGIES TOR LÆDRE, UNIVERSITETET I BERGEN I dagens digitale økonomi forventer bedrifter at teknologien skal spille en avgjørende rolle i forretningen, skape nye forretningsmodeller og forbedre... 3 years ago | 30 mins Detecting Tor in Your Network Ollie Sheridan, Gigamon Principal Engineer; Brandon Dunlap, Moderator Tor, "The Onion Router", is a protocol for anonymously browsing the Internet as well as ".onion" sites that are only accessible via the Tor Network (a... 2 years ago | 61 mins Illuminating the Dark Web Simon Bryden & Alain Forcioli, Consulting Systems Engineers, Fortinet Join our Fortinet experts in this session which provides an introduction and practical demonstration of the Dark Web. Topics covered include: - Wh... 3 years ago | 73 mins Solarmarker, Part II: A Security Analyst’s Perspective and Live Analysis Adam Boretos and Nick Cavalancia Join Rapid7 for this on-demand webcast focused on Solarmarker malware. In this webcast, Rapid7 Detection & Response Analyst, Adam Boretos and UIS' Ni... 1 year ago | 88 mins Making Data Center Connectivity Management Easier David Cuthbertson, Jerry Bowman - Square Mile Systems Increasing connectivity complexity requires an evolution in data center planning and change management. If TIA606C, diverse routing, BICSI-002, VLAN, ... 9 years ago | 47 mins State of the Market: Nordics Critical Connections: Greening The TMT Sector Capture market forecasts and deep dive with regional leaders and experts to discover how the Nordics are leading the way in reducing carbon emissions ... 2 years ago | 76 mins Where's Your Data? Project Cumulus, a Data Breach Investigation Rich Campagna, VP Products and Marketing, Salim Hafid, Product Marketing Manager PROJECT CUMULUS: HOW HACKS UNFOLD In Project Cumulus, Bitglass researchers created a fictitious bank and leaked a bank employee's "phished" credentia... 7 years ago | 44 mins Ransomware Resurgence: Locky and Other “New Cryptolockers” Nick Bilogorskiy, Sr. Director, Threat Operations, Cyphort Like many viruses, botnets and malware families that we’ve seen over the past decade, hackers continue to find new ways of reinventing old threats. An... 7 years ago | 39 mins Intersect Product Lead on Featureless Product Roadmaps Sam Kawtharani Creating a product roadmap is a delicate balancing act between building a product that maximizes revenue while being able to create an impact in the s... 3 years ago | 34 mins Encrypted DNS: Friend or Frenemy? Michael Katz, Cyber Security Sales Specialist, Infoblox; Brandon Dunlap, Moderator DNS is the last critical service on the Internet and in your organization that runs unencrypted or 'in the clear'. Competing consortiums of standards... 3 years ago | 59 mins