ITG Debates presents a debate between FireEye and Eko Devices on the topic "Is data security just as important as cutting-edge healthcare technology." FireEye manufactures top of the line network security products, and regularly produces research on the modern cyber threat landscape. Eko Devices is a startup on the cutting edge, producing the world's smartest stethoscopes which generate data that is stored on the network. This debate will be hosted by ITG, and will explore the impacts of cyber threats and modern medicine technology on quality of care, patient data, privacy, and hospital brand. This debate will have relevant information for anyone in the IT and infosec sectors, as well as hospital, healthcare, and other health related industry professionals. Attendees will have an opportunity to win a GoPro Hero3!Read more >
New vendors are appearing in the market “solve” all your backup problems. But are these “rookies” really up to the challenge or are they making the situation worse?
Join us for our live webinar, “Veteran vs. Rookie - Who is Best Able to Meet The Enterprise Backup Challenge.”
Learn who can solve the 5 key data protection challenges
1. Protecting legacy applications
2. Protecting cloud applications
3. Rapid data growth
4. Rapid recovery expectations
5. Lack of recovery confidence
Artificial intelligence was Gartner’s top 2017 strategic technology trend, and the year isn’t over yet. But for too many companies, AI myths are persistent, use cases and strategies are still on the “shiny new thing” level, and expectations continue to hover in the spirit of Skynet/HAL, making it hard to determine whether it’s really right for your company.
As AI technologies multiply, how do you sort fact from fiction? Should you stop daydreaming about replacing your entire staff with chatbots — or can you start augmenting agent abilities? Most importantly, while AI undoubtedly has shown real-live ROI in case study after case study, where is the particular value in chasing the AI buzz for your own company?
Register now for our our latest VB Live event and find out. We’ll be tackling the AI legends and the AI realities, breaking down the potential AI has for your bottom line, and giving you a glimpse of the future of AI for business.
In this webinar, you’ll explore:
* Myths and realities of AI replacing vs. augmenting staff functions
* How to bake AI into your business strategy
* On- and offline use cases for AI
* The future of AI for business
* Avinash Gangadharan, Sr Director of Engineering, Walmart
* Allen Sebrell, Senior Manager E-Commerce Team, Amtrak
* Deep Varma, VP of Engineering, Trulia
* Stewart Rogers, Analyst-at-Large, Venturebeat
* Rachael Brownell, Moderator, VentureBeat
As the cloud transforms enterprise IT, it brings a lot more savings than cold hard cash. No question, reducing infrastructure costs is the #1 attraction to cloud. But there are two other cost dimensions with huge impact on security that must not be ignored. The payoffs depend on whether you approach security with a cloud vs. on-premises model. An organization’s choices are crucial – both for enterprise security and for the roles of its stakeholders.Read more >
This webinar discusses mobile device security fact vs perception. We will dive into the findings of a recent mobile security research study of over 1,900 cybersecurity professionals’ perceptions on mobile threats and contrast these opinions against mobile threat realities from Zimperium’s Global Threat Report, with real-word data driven from millions of licensed mobile endpoints around the world.
Please join Holger Schulze, Founder of the Information Security Community, and JT Keating, Vice President of Product Strategy at Zimperium, for an interactive webinar that will outline:
● The latest mobile security perceptions from Information Security’s 2017 Spotlight Report.
● Mobile risk and threat realities from Zimperium’s Global Threat Report, with data driven from millions of licensed mobile endpoints around the world.
● Detailed descriptions of device, network and application attacks and vulnerabilities, along with brief recommendations of how to prevent and remediate each.
George & Ryan talk about news on OnDeck, the Justice Department, Lending Club.
We then discuss articles on:
Banking as a service
An explanation of Machine Learning.
An analysis of digital electronics vs. Analog electronics.
Plus, an event in New York City on April 18th.
Find out more here:
Build vs buy - It’s a common dilemma in a world of seemingly endless engineering talent and an abundance of SaaS products. Many companies start by building but quickly realize that maintenance costs and engineering hours can quickly cause budgets and project-time lines to spiral out of control.
Tout, a video app platform that allows users to upload content directly to their sites, found themselves facing this exact dilemma after building their own analytics infrastructure and using it in conjunction with a BI tool. After three years of heavy growth and feature expansion, their analytics stack could no longer keep up with the demands and costs were through the roof.
Tout decided it was time to invest in a new solution and turned to Treasure Data for their analytical infrastructure and Looker for Analytics and is now reaping the rewards.
What will you learn?
- The pitfalls of building (and maintaining) in-house solutions
- How Treasure Data simplifies data pipelines for effective data lifecycle management
- How Looker let Tout give every employee access to the data they needed when they needed it
- Actionable criteria for deciding when to buy vs. build analytics infrastructure
Recent controversies such as Apple vs FBI have highlighted that often strong security is a prerequisite for privacy, and that upholding privacy can ensure stronger security is built into software. As consumers become more aware of privacy issues, can the argument still be made that security must be sacrificed in place of privacy? How do new technologies confirm or deny this notion?Read more >
When it comes to managing cyber risk, what is the best approach? Fixing application vulnerabilities with strong security process before going into production? Or mitigating vulnerabilities through some other technology in production?
Security breaches are on the rise, many of which occur due to vulnerabilities in the application layer. New vulnerabilities are discovered daily and the frantic pace of software development shows no signs of slowing down. What chances do we have to turn the tables on Web Application security breaches?
Join the debate on Remediation vs. Mitigation to learn:
•How both approaches work to protect your web applications
•How you can improve your development process
•How to improve security of applications deployed in production
Network security is changing.
Learn why leading organizations are rapidly adopting a Software-Defined Perimeter instead of a traditional Network Access Control security model.
This webinar discusses:
Similarities and differences between Software-Defined Perimeter and Network Access Control models
Visibility and security – What’s the difference? Why does it matter?
Implementation and maintenance considerations
On-premises vs. cloud infrastructure considerations
Jason Garbis: Leads the Cloud Security Alliance’s Software-Defined Perimeter working group.
Randy Rowland: An executive who lead the effort to transform VMware into a cloud provider through the vCloud Hybrid Service (vCHS) and Cloud Foundry initiatives.
In this interview with Dark Reading at Blackhat 2016, Brian Gillooly and Roger Thorton discuss AlienVault's take on the detection vs prevention debate that often occurs within the security community.Read more >
Join us for this timely discussion with privacy and data security experts. With ever looming environmental threats such as of ransomware, data theft, denial-of- service attacks, every organization and every industry must be focused on IT security. However, there is a delicate balance and frequent conflicts between the idea of information privacy and security.
How much individual privacy can be expected in an inter-connected world? How much should be sacrificed for the sake of maximizing corporate security? And where (if anywhere) can the lines between personal and corporate be drawn? How do these issue impact policies, training and security surrounding even the most simple of business communication tools: email.
This presentation will provide an overview of the privacy vs. security challenges and explore specifically how these issues are impacting the issue of user email credentials and email vulnerabilities. This is especially critical given that emails are the number one contributor to data breaches. In fact, 63% of breaches in the US last year were the result of a compromised email credential.
We will then a) discuss common misperceptions and security holes that can lead to ransomware and other malware vulnerabilities, b) compare the various alternatives for proactively addressing these vulnerabilities, and c) discuss strategies for preventing and responding to cyberattacks.
Cost vs. quality: It’s a perennial issue in technical service and support. Drive your costs too low, and you risk sacrificing the quality of service. Conversely, if you push quality too high (yes, that’s possible!), then you drive your costs through the roof. Understanding the cost/quality tradeoff is the most critical step toward optimizing your support model.
Using data from more than 300 benchmarks worldwide, Jeff Rumburg will illustrate how top-performing service and support organizations strike an appropriate balance between the cost of service delivery and the quality of support provided. He’ll share simple yet powerful techniques that will enable organizations to pinpoint their position on the cost vs. quality curve, determine if higher (or lower) quality is justified, reduce costs without sacrificing quality, and improve quality without increasing costs.
Finally, he’ll share an interactive scorecard that organizations can use to determine whether service and support has been optimized, and, if it hasn’t, to identify the tangible steps needed to achieve an optimized support model.
Check out our 2-minute video on “VoIP vs. VoLTE."
Learn more about VoIP at Cradlepoint.com
Watch more Cradlepoint Whiteboard Videos:
Is Regtech the new Fintech? The definition of Regtech differs depending on who you speak with. New fintech companies are now finding themselves having to comply with regulations for the first time. How will these affect them and how does this differ from incumbent organisations?
In this panel session, we will discuss:
-what are the existing regulated entities?
-how do new regulations affect banks vs. fintech start-ups
-how should fintech start-ups prepare for these regulations?
-the difference between new regtech companies and existing tech companies providing regulation services
-do regulators have the scope to accommodate Fintech companies?
Does your storage system scale as you grow?
Should you go with scale-up or scale-out architecture?
Which hybrid scale-out NAS is right for you?
Netapp, EMC Isilon, Panasas, Lustre - which one is the best fit for you?
In this on-demand webinar, Panasas's Andre Franklin, Sr. Product Marketing Manager presents on:
- Scale and Scalability
- Scale-up vs. Scale-out
- Measuring Scalability
Gain competitive advantage with scalability.
- RSA 2016 -
BrightTALK spoke to EJ Hilbert to get his thoughts on cyber techniques being used in conflicts in the middle east, the Apple vs FBI unlock case and the constant threat to critical infrastructure of ransomware.
- RSA 2016 -
BrightTALK got the chance to catch up with Virus Bulletin's Martijn Grooten to hear his thoughts on the Apple vs FBI case; how to best protect healthcare institutions from cyber attacks and his reasons to be optimistic in the cyber security space in 2016.