ITG Debates presents a debate between FireEye and Eko Devices on the topic "Is data security just as important as cutting-edge healthcare technology." FireEye manufactures top of the line network security products, and regularly produces research on the modern cyber threat landscape. Eko Devices is a startup on the cutting edge, producing the world's smartest stethoscopes which generate data that is stored on the network. This debate will be hosted by ITG, and will explore the impacts of cyber threats and modern medicine technology on quality of care, patient data, privacy, and hospital brand. This debate will have relevant information for anyone in the IT and infosec sectors, as well as hospital, healthcare, and other health related industry professionals. Attendees will have an opportunity to win a GoPro Hero3!Read more >
Recent controversies such as Apple vs FBI have highlighted that often strong security is a prerequisite for privacy, and that upholding privacy can ensure stronger security is built into software. As consumers become more aware of privacy issues, can the argument still be made that security must be sacrificed in place of privacy? How do new technologies confirm or deny this notion?Read more >
In this interview with Dark Reading at Blackhat 2016, Brian Gillooly and Roger Thorton discuss AlienVault's take on the detection vs prevention debate that often occurs within the security community.Read more >
Join us for this timely discussion with privacy and data security experts. With ever looming environmental threats such as of ransomware, data theft, denial-of- service attacks, every organization and every industry must be focused on IT security. However, there is a delicate balance and frequent conflicts between the idea of information privacy and security.
How much individual privacy can be expected in an inter-connected world? How much should be sacrificed for the sake of maximizing corporate security? And where (if anywhere) can the lines between personal and corporate be drawn? How do these issue impact policies, training and security surrounding even the most simple of business communication tools: email.
This presentation will provide an overview of the privacy vs. security challenges and explore specifically how these issues are impacting the issue of user email credentials and email vulnerabilities. This is especially critical given that emails are the number one contributor to data breaches. In fact, 63% of breaches in the US last year were the result of a compromised email credential.
We will then a) discuss common misperceptions and security holes that can lead to ransomware and other malware vulnerabilities, b) compare the various alternatives for proactively addressing these vulnerabilities, and c) discuss strategies for preventing and responding to cyberattacks.
Cost vs. quality: It’s a perennial issue in technical service and support. Drive your costs too low, and you risk sacrificing the quality of service. Conversely, if you push quality too high (yes, that’s possible!), then you drive your costs through the roof. Understanding the cost/quality tradeoff is the most critical step toward optimizing your support model.
Using data from more than 300 benchmarks worldwide, Jeff Rumburg will illustrate how top-performing service and support organizations strike an appropriate balance between the cost of service delivery and the quality of support provided. He’ll share simple yet powerful techniques that will enable organizations to pinpoint their position on the cost vs. quality curve, determine if higher (or lower) quality is justified, reduce costs without sacrificing quality, and improve quality without increasing costs.
Finally, he’ll share an interactive scorecard that organizations can use to determine whether service and support has been optimized, and, if it hasn’t, to identify the tangible steps needed to achieve an optimized support model.
Check out our 2-minute video on “VoIP vs. VoLTE."
Learn more about VoIP at Cradlepoint.com
Watch more Cradlepoint Whiteboard Videos:
Is Regtech the new Fintech? The definition of Regtech differs depending on who you speak with. New fintech companies are now finding themselves having to comply with regulations for the first time. How will these affect them and how does this differ from incumbent organisations?
In this panel session, we will discuss:
-what are the existing regulated entities?
-how do new regulations affect banks vs. fintech start-ups
-how should fintech start-ups prepare for these regulations?
-the difference between new regtech companies and existing tech companies providing regulation services
-do regulators have the scope to accommodate Fintech companies?
Does your storage system scale as you grow?
Should you go with scale-up or scale-out architecture?
Which hybrid scale-out NAS is right for you?
Netapp, EMC Isilon, Panasas, Lustre - which one is the best fit for you?
In this on-demand webinar, Panasas's Andre Franklin, Sr. Product Marketing Manager presents on:
- Scale and Scalability
- Scale-up vs. Scale-out
- Measuring Scalability
Gain competitive advantage with scalability.
- RSA 2016 -
BrightTALK spoke to EJ Hilbert to get his thoughts on cyber techniques being used in conflicts in the middle east, the Apple vs FBI unlock case and the constant threat to critical infrastructure of ransomware.
- RSA 2016 -
BrightTALK got the chance to catch up with Virus Bulletin's Martijn Grooten to hear his thoughts on the Apple vs FBI case; how to best protect healthcare institutions from cyber attacks and his reasons to be optimistic in the cyber security space in 2016.
Join us on February 25th @ 1:00 PM CST for the "CylancePROTECT - Proactive Protection from Malware vs. Reactive Detect & Respond" webinar, offering a complete look at HOW our solution works to find threats that the others simply miss.
In this session, attendees will learn about a game-changing endpoint security solution that requires:
NO signatures or hash lookups.
NO weekly, daily or hourly virus definition database updates.
NO resource hogging sandbox environments.
Who should attend: Security staff, IT Directors, Audit and Compliance personnel, and anyone at the financial institution interested in securing the FI’s desktops and servers and preventing costly malware outbreaks.
Containers are one of the hottest topics in the IT world today and much conversation is around the perceived advantages of using containers. This webinar will discuss the benefits and challenges with containers vs VMs and how both containers and virtualization technology have a place in IT. We will also show how Stratoscale's platform allows IT teams to manage them both with a unified infrastructure and pane of glass.Read more >
This is a replay of the previous webinar on the blurring line between Cloud Foundry, Diego and Docker. We had some technical issues with the livecast, but here is a replay with proper audio and slides. Thank you for joining us again!
Here is the full agenda:
Part 1: Cloud Foundry vs Docker vs Diego
– Containers vs Cloud Foundry PaaS
– Docker vs Cloud Foundry Diego
– Docker vs Cloud Foundry
– Cloud Foundry Diego vs Fig vs Docker Swarm
Part 2: Who is using containers in production?
– The dark side of AWS when it comes to Cloud Foundry.
– Examples of Cloud Foundry clusters in AWS, OpenStack & vCloud.
– Cloud Foundry Case Studies in Fortune 500 (1 x Technology, 1 x Pharma, 1x Financial Services).
Part 3: Driving adoption of Cloud Foundry in a large organization
– What not to expect from CF.
– Anatomy of 5 stages of Cloud Foundry adoption in a large organization.
– Developer pushback!? What works vs doesn’t.
Part 4: Operating Cloud Foundry
– How much resources and $ does it take to operate your own CF?
– Ops team sizing.
– Cluster sizing.
– Metrics to measure success of Cloud Foundry program
Part 5: Cloud Foundry Diego – demo of clustered Diego + Docker