Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Under the Hood: A Deep Dive into the Next Evolution of Risk Management Alfred Trevino - Cloud Security Architect Are you interested in learning how to effectively manage risks in your cloud environment? Join us for a Check Mates webinar on leveraging the Cloud Na... 3 days ago | 56 mins Automating Cyber Risk Management with FortifyData and Nanjgel Solutions Jude Pereira, CEO of Nanjgel, and David Oliveira, Director at FortifyData Automating Cyber Risk Management with FortifyData and Nanjgel Solutions: Reducing cyber risk by automating continuous asset discovery and assessments ... 2 weeks ago | 49 mins How a Risk-based XDR Approach Improves Threat Detection and Response Jon Oltsik, Analyst and Fellow with Enterprise Strategy Group and Briana Farro, Director, XDR Product Management with Cisco Existing threat detection and response technologies are not as effective as they need to be for today’s security landscape. This unfortunate reality i... 2 weeks ago | 48 mins Are you protected from endpoint vulnerability exploits? Bar Yassure, Harmony Endpoint product manager; Sergey Shykevich, Threat Intelligence Group Manager Endpoint vulnerabilities serves a direct entry point for cyber attackers to gain unauthorized access to an organization's network and sensitive data. ... 2 weeks ago | 53 mins Are you protected from endpoint vulnerability exploits? Bar Yassure, Harmony Endpoint product manager; Sergey Shykevich, Threat Intelligence Group Manager Endpoint vulnerabilities serves a direct entry point for cyber attackers to gain unauthorized access to an organization's network and sensitive data. ... 2 weeks ago | 57 mins Understanding OpenText Cybersecurity's Global & Email Threat Reports Tyler Moffitt, Grayson Milbourne and Troy Gill Get the latest facts from the 2023 OpenText Cybersecurity Threat Report & Email Threat Report to be prepared for everything today's threat landscape w... June 15, 2023 3:00pm F5 Distributed Cloud WAAP Demo Day Foo-Bang Chan, Senior Solutions Architect, F5 As workload deployments proliferate across diverse environments and app architectures, organizations want to be able to enforce consistent security co... 2 weeks ago | 58 mins RSA Key Takeaways Tasha Holloway, Pentester & Owner of NerdLogic, Richard Stiennon, Crystal Poenisch, Jack Roehrig, Bronwen Hudson Whew–the superbowl of the cybersecurity world is behind us! Let’s recap, shall we? Whether you’re recovering from RSA or still reeling from the FOMO... 4 days ago | 44 mins Total Economic Impact Study: NETSCOUT nGenius Enterprise Performance Management E. Haggerty, AVP, Prod. & Soln. Mktg NETSCOUT; C. Casanova, Prin. Analyst, Forrester; E. Desai, TEI Consultant, Forrester When deciding upon an application and performance management solution, one must evaluate the technical and financial merits before making a final deci... June 22, 2023 5:00pm Introducing Advanced DDoS Protection with Quantum DDoS Protector X Ezer Goshen (VP Business Development & Strategic Partnerships, Radware) DDoS attacks rose to nearly 20 million last year; a growth of 100%! Attackers use sophisticated techniques that traditional security solutions are not... 4 days ago | 66 mins Load more