Remove Architecture Remove Technology Remove Webinar
article thumbnail

Upcoming webinar: How a leading architecture firm approaches cybersecurity

Malwarebytes

On March 28, 2024, Malwarebytes CEO, Marcin Kleczynski, and Payette Associates Director of Information Technology, Dan Gallivan, will answer these questions and more in our live Byte into Security webinar. Why attend?

article thumbnail

20 Years of SIEM Webinar Q&A

Anton on Security

I recently did this fun SANS webinar titled “Anton Chuvakin Discusses “20 Years of SIEM?—?What’s What’s Next?”” (the seemingly self-centered title was suggested by CardinalOps who organized the webinar). As it is common for SANS webinars , we got a lot of great questions that I feel like re-answering here for posterity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

article thumbnail

Transform your Architecture for the Cloud with MVISION UCE and SD-WAN

McAfee

“Features are a nice to have, but at the end of the day, all we care about when it comes to our web and cloud security is architecture.” – said no customer ever. As a result, organizations are coming around to the realization that digital transformation demands a corresponding network and security architectural transformation.

article thumbnail

Get an Untrusted Security Advisor! Have Fun, Reduce Fail!

Anton on Security

What are some ideas for doing architecture in cases of X and Y constraints? In what way is this new technology actually even more risky? Summary — The Good: Ideation and Brainstorming: LLMs excel at generating ideas for security architectures, controls, and approaches. tell me what to do!). So let’s create new ideas.

article thumbnail

News Alert: Infinidat introduces advanced cyber resiliency and recovery solution for enterprises

The Last Watchdog

Enterprises need proactive strategies, seamless integration across IT domains, and the most advanced, automated technologies to stay ahead of cyber threats,” said Eric Herzog, CMO at Infinidat. Webinar On Demand. To watch Infinidat’s end-user webinar about the new solutions ? Connect with Infinidat.

article thumbnail

The Bridge to Zero Trust

CyberSecurity Insiders

John Masserini, of Tag Cyber, will explore practical approaches to advancing zero trust along with his fellow panelists: Kevin Dana, VP of Information Technology for World Wide Technology; Marcos Christodonte II, Global CISO for CDW; and Allen Jeter, Director of IT for Chainalysis.