NEWS
How do you protect your business data?

As digitization continues to pick up speed, the availability of data is the factor that determines business success. At the same time, enterprises must take a new approach to data protection.

Watch Online
NEWS
How to communicate security incidents?

In this episode of Business Matters, we reflect on the events of 2015 with Denis Zenkin, Senior Vice President, Corporate #Communications, who was in the middle of the whirlwind surrounding the #Duqu 2.0 #incident and outgoing communications.

Watch Online
NEWS
State of North Dakota Builds SOC Strategy Around Cortex

With a state Senate mandate to provide cybersecurity services to all state agencies and a shortage of trained security personnel, the State of North Dakota SecOps team has deployed Cortex XDR and Demisto as the cornerstone of their new SOC strategy.

Watch Online
NEWS
Cisco Endpoint Security Analytics built on Splunk

An endpoint analytics product built just for Splunk users!

Watch Online
NEWS
The Executive Misconceptions of Cybersecurity

Watch as Magda Chelly, Managing Director and CISO on Demand, Responsible Cyber, talks with RSA CTO Zulfikar Ramzan, PhD about the misconceptions she sees executives having about the InfoSec industry.

Watch Online
NEWS
What People Are Saying about Digital Risk

How are industry leaders thinking about the digital risk challenges emerging through digital transformation efforts? Watch to see what some RSA Conference attendees had to say.

Watch Online
NEWS
Applying Lessons Learned to Defend Against Attacks

Region 11 had a ransomware attack, which led them to a multi-tiered approach using VMware NSX. When they were attacked again, they were protected.

Watch Online
NEWS
What can CISOs do to reduce the risk that email threats pose?

62% of security professionals in Asia Pacific say that defending against user behavior is their #1 challenge. Find out what else can businesses do to reduce the risk that email threats pose with Stephen Dane, Managing Director, Cybersecurity, APJC, Cisco.

Watch Online
NEWS
Seattle Proton Therapy Keeps Patient Data Safe and Available

Seattle Proton Therapy turned to Dell EMC Data Protection to solve an immediate capacity need for backing up their patients’ medical records while complying with government regulations like HIPAA. They found the Dell EMC IDPA DP4400 appliance easy to deploy, with a minimal learning curve for their admins. With excellent deduplication, they continue to save space, and they’ve reduced the time to access crucial data from 1 to 2 weeks to a matter of minutes.

Watch Online
NEWS
The Annie E. Casey Foundation Success Story: Powerful PAM in the Cloud

“The cloud cost was less than having it on-prem. We reduced our servers by 85%. We don’t have to patch the servers or worry about a breach.”

Watch Online
NEWS
Cybersecurity Insights: John Pescatore

At the "Cybersecurity Insights: Security in the Digital Era" event, John Pescatore, Director at SANS Institute, discusses how infrastructure and security have always been linked, but not particularly successful. Why has it failed and what must happen now?

Watch Online
NEWS
Why you should care more about your email security?

Email is the number one threat vector for delivery of malware into organizations. Stephen Dane, Managing Director, Cybersecurity, APJC, Cisco, explores the current state of the challenges that security practitioners face, and what CISOs can do to reduce the risk that email threats pose.

Watch Online
NEWS
Bring on the future — Eugene Kaspersky talks about the recent re-branding

The company founder explains the main changes behind Kaspersky’s new brand, and also talks about why now is the right time to do it.

Watch Online
NEWS
Cisco Stealthwatch - network and cloud threat detection

It should be: With today's attack landscape, continuous threat detection and monitoring is a must-have, not an option. See how Stealthwatch can help by analyzing your entire network traffic, on-premises or in the cloud. It reduces massive data sets to high-fidelity alarms using behavioral modeling, machine learning and Talos threat intelligence.

Watch Online
NEWS
Protecting the frontlines of cybersecurity from nanoscale to enterprise-scale

By 2021, it’s estimated that cybercrime will cost the world economy more than $6 trillion. In our hyper-connected world, every device is storing and computing data making it a potential touch point for intrusion by a cybercriminal, ransomware, or malware. Understanding the shifting threat landscape is crucial to safeguarding data. This is why Hewlett Packard Enterprise is building security into everything we do. Explore how security innovations from Hewlett Packard Labs make into product roadmaps and find out what top IT security trends and challenges to look out for in the near to longer term.

Watch Online

News

On-storage containerization reduces unnecessary hardware investment and space.
UK retail giant bolsters security across complex merger and acquisition environments.
High-performance low-code development platform helps differentiate Sodexo Engage in the competitive benefits and reward market.
Memorandum of Understanding (MoU) agreement is part of ABB’s global strategy to grow through a network of channel partners.

Expert Opinions

By Richard Melick, Director, Product Marketing for Endpoint Security at Zimperium.
By Graham Jarvis, Lead Journalist – Business and Technology
By Anthony Lamoureux, CEO of Velocity Smart, a global provider of smart locker solutions
Under pressure from big merchants and watchful regulators, the two mega app stores Apple and Google made concessions last year that gave merchants monetisation options outside of their stores. For example, in June 2020, the European Commission opened an anti-trust investigation to “assess whether Apple's rules for app developers on the distribution of apps via the App Store violate EU competition rules.”