Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Supply Chain Security Snags Tim Mackey, Principal Security Strategist The executive order issued by the White House last year calls for more robust software supply chain protections for federal agencies. Meanwhile, compa... 2 days ago | 54 mins Integrated data center management in a new world Jeremy Clute, VP of Business Development, Nlyte Software Over the past year, data center operators have been adjusting to greater scrutiny from the public and governing bodies. This scrutiny has translated i... 1 week ago | 60 mins Fix it Fast: 6 Ways LogicMonitor Helps You Reduce MTTR Taylor Coppock, Product Marketing Manager; Sabina Friden, Product Marketing Manager; David Femino, Sr. Product Manager No matter how you set and define your MTTR goals, reducing service impacts is key to minimizing impact across your teams and customers. One of the bes... 3 weeks ago | 47 mins Automagic API Security Testing Steve Chappell, SW Manager & API Security Evangelist Most API Security tools/platforms are built for the Security teams that are told “here’s an API service already running – go secure it”. Thus, they ta... 1 month ago | 30 mins What you see, you understand. Total network visibility in the palm of your hand John Burke - Nemertes, Marc Wheeler - Cisco, Sander Barens - Expereo and Nick Cavalancia - Conversational Geek In this series we have covered Global Internet Connectivity for the enterprise, and ensuring the Internet is tamed for the business environment. But t... 2 days ago | 45 mins Improve Your Organization's Cybersecurity with a Framework-Based Approach Deo Orsolino, Sales Engineer, Progress In this 45-minute talk, we will explore how Network Detection and Response can help improve your organization's cybersecurity posture by adopting a fr... April 4, 2023 3:00am Essential strategies for increasing real-time visibility & adaptability Teresa Law & Elisha Harrington Join us to hear experts share essential strategies for risk management—including how to increase real-time visibility and adaptability for your risk a... April 6, 2023 4:00pm How to Comply with Current EU Regulations NIS2 & RCE Roman Cupka, Cybersecurity Expert at Progress Software Within 20 months, individual EU Member States are expected to transpose the NIS2 and RCE directives into national legislation. It will concern not onl... April 4, 2023 9:00am How to create unified SDWAN and delivery dashboards to understand e2e experience Broadcom DX NetOps Product Management and Product Marketing Teams Small Bytes Episode #12 - DX NetOps unique capabilities to provide unified dashboards consisting of multiple technologies presents unique opportunitie... 3 days ago | 22 mins F5 and AWS: Protect your APIs and Guard Against Automated Threats Jerald Cheong, Solutions Architect F5 & Ram Cholan, Senior Solutions Architect, Edge Services, Amazon Web Services Rapid application updates, third-party APIs and malicious bots expose your businesses to risk. Organizations are looking for secure, reliable, perform... 2 days ago | 49 mins Load more