Hi [[ session.user.profile.firstName ]]
Sort by:
    • Value at the Speed of Business: Insights from the 2016-17 World Quality Report
      Value at the Speed of Business: Insights from the 2016-17 World Quality Report John Jeremiah, Product Marketing Manager, Hewlett Packard Enterprise Recorded: Feb 14 2017 3:00 am UTC 52 mins
    • Today we are in an age of digital consumers who are hyper-connected, expecting information and service wherever and whenever they want. Companies must be able to respond to the increasing demands of their customers with superior products and services without sacrificing quality or security.

      In this webinar you will learn about key findings from the eighth edition of the World Quality Report, which illustrates the impact of trends like Agile, DevOps, IoT and others. These trends are forcing organizations to disrupt with digital at an ever-faster pace. Specifically you will learn more about these 4 key trends in QA and Testing:

      • Digital Transformation driving and shaping IT strategy
      • Agile and DevOps continue to expand and grow in adoption
      • Internet of Things a disrupting force with real implications on quality
      • Infrastructure costs (test environments); a rising concern

      Read more >
    • Defending Against Cyberthreats: CyberEdge's 2016 Cyberthreat Defense Report
      Defending Against Cyberthreats: CyberEdge's 2016 Cyberthreat Defense Report Steve Piper, Co-founder and CEO of CyberEdge Group, Mike Reagan, CMO of LogRhythm Recorded: Dec 15 2016 12:00 am UTC 60 mins
    • Despite record security spending, successful cyberattacks are on the rise. Seventy-six percent of organizations around the globe were compromised by a successful cyber attack in in 2015—up from 62% in 2014.

      Savvy IT professionals know that it’s no longer a question of if their network will become compromised, but when. Smart CIOs and CISOs must strike a balance between threat prevention and detection investments, as both are critical in the fight against today’s sophisticated threats.

      Steve Piper, CEO of the information security research firm CyberEdge Group, is joined by Mike Reagan, CMO of LogRhythm, to share the findings of the 2016 Cyberthreat Defense Report.

      This webinar will reveal the current security posture of today’s organizations, gauge perceptions about cyberthreats, and disclose future plans for improving security and reducing risk.

      You’ll discover:

      • Deep insights into how IT security professionals perceive cyberthreats
      • What they’re doing to defend against threats
      • How security information and event management (SIEM) can be implemented within an organization to increase confidence and decrease the time it takes to detect and respond to cyberthreats

      See how you compare. Register now for a 360-degree view of the threats, response plans, processes and investments that organizations are making in 2016.

      Read more >
    • Defending Against Cyberthreats: CyberEdge's 2016 Cyberthreat Defense Report
      Defending Against Cyberthreats: CyberEdge's 2016 Cyberthreat Defense Report Steve Piper, Co-founder and CEO of CyberEdge Group, Mike Reagan, CMO of LogRhythm Recorded: May 11 2016 6:00 pm UTC 60 mins
    • Despite record security spending, successful cyberattacks are on the rise. Seventy-six percent of organizations around the globe were compromised by a successful cyber attack in in 2015—up from 62% in 2014.

      Savvy IT professionals know that it’s no longer a question of if their network will become compromised, but when. Smart CIOs and CISOs must strike a balance between threat prevention and detection investments, as both are critical in the fight against today’s sophisticated threats.

      Steve Piper, CEO of the information security research firm CyberEdge Group, is joined by Mike Reagan, CMO of LogRhythm, to share the findings of the 2016 Cyberthreat Defense Report.

      This webinar will reveal the current security posture of today’s organizations, gauge perceptions about cyberthreats, and disclose future plans for improving security and reducing risk.

      You’ll discover:

      • Deep insights into how IT security professionals perceive cyberthreats
      • What they’re doing to defend against threats
      • How security information and event management (SIEM) can be implemented within an organization to increase confidence and decrease the time it takes to detect and respond to cyberthreats

      See how you compare. Register now for a 360-degree view of the threats, response plans, processes and investments that organizations are making in 2016.

      Read more >
    • HP Cyber Risk Report 2015: The Past is Prologue
      HP Cyber Risk Report 2015: The Past is Prologue Jewel Timpe, Senior Manager- Threat Research, HP Security Research Recorded: Jun 9 2015 4:00 pm UTC 27 mins
    • In the world of information security, the past isn’t dead; it isn’t even the past.

      The 2015 edition of HP’s annual security-research analysis reveals a threat landscape still populated by old problems and known issues, even as the pace of new developments quickens. In 2014, well-known attacks and misconfigurations existed side-by-side with mobile and connected devices (the “Internet of Things”) that remained largely unsecured. As the global economy continues its recovery, enterprises continued to find inexpensive access to capital; unfortunately, network attackers did as well, some of whom launched remarkably determined and formidable attacks over the course of the year.

      The 2015 edition of the HP Cyber Risk Report, drawn from innovative work by HP Security Research (HPSR), examines the nature of currently active vulnerabilities, how adversaries take advantage of them, and how defenders can prepare for what lies ahead. Jewel Timpe, HPSR’s senior manager of threat research, describes the report’s findings and explains how this intelligence can be used to better allocate security funds and personnel resources for enterprises looking toward tomorrow.

      Read more >
    • The Staffing Advantage Report: How to Get Your Staffing Firm to the Top
      The Staffing Advantage Report: How to Get Your Staffing Firm to the Top Eric Gregg, CEO, Inavero Recorded: Nov 10 2016 6:00 pm UTC 53 mins
    • Did you know that the average client works with three different staffing firms? The majority of them (59 percent) say it gives them better access to talent because if one firm can’t help them, they have other options, according to CareerBuilder and Inavero’s 2016 Staffing Advantage survey.

      It’s safe to say the competition is fierce among staffing firms vying for business today.

      That’s why CareerBuilder has partnered with Inavero to bring you exclusive market research and industry insights to help you go inside the minds of both candidates and clients to better understand the competitive staffing landscape.

      The 2016 Staffing Advantage Webinar hosted by Kyle Braun, CareerBuilder Staffing and Recruiting Group, President, CareerBuilder, and Eric Gregg, CEO, Inavero will also help you answer questions such as:

      - What are your competitors doing?
      - How can you outpace the best staffing firms out there?
      - How can you run your staffing firm the smartest way?
      - How can you win business?
      - How can you win over candidates?
      - How can you use technology as a competitive advantage?

      Read more >
    • HP Cyber Risk Report 2015: The Past is Prologue
      HP Cyber Risk Report 2015: The Past is Prologue Jewel Timpe, Senior Manager- Threat Research, HP Security Research Recorded: Mar 12 2015 5:45 pm UTC 28 mins
    • In the world of information security, the past isn’t dead; it isn’t even the past. The 2015 edition of HP’s annual security-research analysis reveals a threat landscape still populated by old problems and known issues, even as the pace of new developments quickens. In 2014, well-known attacks and misconfigurations existed side-by-side with mobile and connected devices (the “Internet of Things”) that remained largely unsecured. As the global economy continues its recovery, enterprises continued to find inexpensive access to capital; unfortunately, network attackers did as well, some of whom launched remarkably determined and formidable attacks over the course of the year.

      The 2015 edition of the HP Cyber Risk Report, drawn from innovative work by HP Security Research (HPSR), examines the nature of currently active vulnerabilities, how adversaries take advantage of them, and how defenders can prepare for what lies ahead. Jewel Timpe, HPSR’s senior manager of threat research, describes the report’s findings and explains how this intelligence can be used to better allocate security funds and personnel resources for enterprises looking toward tomorrow.

      Read more >