Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Oslo Forum - Dell EMC PowerEdge – Grunnmuren i det moderne datasenteret EDVARD EDVARDSEN, SENIOR SYSTEMS ENGINEER, DELL TECHNOLOGIES TOR LÆDRE, UNIVERSITETET I BERGEN I dagens digitale økonomi forventer bedrifter at teknologien skal spille en avgjørende rolle i forretningen, skape nye forretningsmodeller og forbedre... 3 years ago | 30 mins Detecting Tor in Your Network Ollie Sheridan, Gigamon Principal Engineer; Brandon Dunlap, Moderator Tor, "The Onion Router", is a protocol for anonymously browsing the Internet as well as ".onion" sites that are only accessible via the Tor Network (a... 2 years ago | 61 mins The Web Browser: A Security & Privacy Train Wreck Brian Zaugg, Director Information Security at Authentic8 The web browser is arguably the most utilized software on any given endpoint. The browser has evolved into a feature-rich tool used to consume & creat... 7 years ago | 49 mins Intersect Product Lead on Featureless Product Roadmaps Sam Kawtharani Creating a product roadmap is a delicate balancing act between building a product that maximizes revenue while being able to create an impact in the s... 3 years ago | 34 mins In-House Digital Forensics Team: Modern Information Security Program 'Must Have" Gregory Braunton National Director, Threat Management, Incident Response & Forensics Catholic Health Intiatives Litigation happens. Is your preservation, collection, presentation and reporting function legally defensible? Likewise, do you have events within your... 4 years ago | 55 mins Advanced Kubernetes Network Design Bikram Gupta, Solutions Architect - Customer Success at Tigera Learn from an expert. At Tigera, we work with hundreds of Calico and Calico Enterprise customers every year and have learned a very important lesson i... 3 years ago | 60 mins Wie Sie die 7 häufigsten neuen Bedrohungen bekämpfen Raimar Melchior - Senior Systems Engineer, F5 Networks Auf dem heutigen digitalen Markt stellen Ihre Anwendungen das Rückgrat Ihres Geschäfts dar. Cloud-basierende Applikationen sind jedoch mit einer Vielz... 5 years ago | 61 mins Podcast: Microsoft Exchange attribution, NSO Spyware, Zero-days, and Clippy Digital Shadows Threat Researchers, Stefano De Blasi, Saul Burban, Rory Donovan and Kim Bromley ShadowTalk hosts Stefano, Saul, Rory, and Kim bring you the latest in threat intelligence. This week they cover: - Microsoft Exchange server attach a... 2 years ago | 51 mins Encrypted DNS: Friend or Frenemy? Michael Katz, Cyber Security Sales Specialist, Infoblox; Brandon Dunlap, Moderator DNS is the last critical service on the Internet and in your organization that runs unencrypted or 'in the clear'. Competing consortiums of standards... 3 years ago | 59 mins Illuminating the Dark Web Simon Bryden & Alain Forcioli, Consulting Systems Engineers, Fortinet Join our Fortinet experts in this session which provides an introduction and practical demonstration of the Dark Web. Topics covered include: - Wh... 4 years ago | 73 mins