Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Porting code to Arm SVE – HPC Webinar Florent Lebeau, Staff Solution Architect Arm Scalable Vector Extension (SVE) is an instruction set for the Arm v8-A architecture that introduces customized features for improving High Perform... 3 years ago | 28 mins Virtual Firmware for Intel Trust Domain Extensions Jiewen Yao, Intel Intel® Trust Domain Extensions (Intel® TDX) introduce architectural elements to help deploy hardware-isolated, virtual machines (VMs) called trust dom... 2 years ago | 57 mins Your Network Isn’t Secure if Your DNS Isn’t Secure Arya Barirani, VP Product Marketing, Infoblox; John Kindervag, VP Principal Analyst, Forrester Research The Domain Name System (DNS) is one of the fastest-growing vectors for online security threats, and most companies are not doing enough to secure thei... 8 years ago | 23 mins The Evolution of the Penetration Test Toby Scott-Jackson, Principle Security Consultant, SureCloud and Chris Cooper, Senior Security Consultant, SureCloud The confluence of sophisticated cyber criminals, white hats and technological change means organisations are increasingly exposed to weaknesses and vu... 7 years ago | 23 mins Preparing for the Next Evolution of DDoS Attacks Nishit Sawhney, Director, Product Management, Verisign Distributed Denial of Service (DDoS) Attacks are a real threat for today’s organizations. Current trends indicate that these attacks are becoming incr... 7 years ago | 41 mins Security Compromise Check: Bridge the Technology Gaps Rafal Los, Principal, HP ESS Security Practice The cyber threat landscape is rapidly evolving. The sophistication of attack vectors have increased and worryingly the sources of attacks are now from... 9 years ago | 55 mins P2P File-sharing Crowd Sourced Malware Distribution Anubis Networks, Threat Intel Researcher BitTorrent is a very well-known protocol for large files distribution over the internet and it’s used by every industry from Linux distributions to co... 7 years ago | 32 mins Ransomware: All your files now belong to us Peter Wood Ransomware is dominating the headlines, and with good reason - it is one of the biggest threats to business in 2016. It has evolved into a self-replic... 7 years ago | 49 mins Is Physical Security important in the cyber world? Dr Michael H. Goldner, Dean of EC-Council University, EC Council University Information security practitioners often overlook or take for granted, physical security and general environmental concerns. They are most concerned ... 8 years ago | 124 mins Myth or Reality: Insider Threat Victims DON'T Have Their Heads in the Cloud Evelyn de Souza, Data Governance Workgroup Chair, Cloud Security Alliance & Data Privacy and Compliance Leader, Cisco Systems We can safely predict that an insider threat targeting cloud will be the cause of a major data breach over the next 12 months. While cloud insider thr... 8 years ago | 44 mins Load more