NEWS
What can CISOs do to reduce the risk that email threats pose?

62% of security professionals in Asia Pacific say that defending against user behavior is their #1 challenge. Find out what else can businesses do to reduce the risk that email threats pose with Stephen Dane, Managing Director, Cybersecurity, APJC, Cisco.

Watch Online
NEWS
Seattle Proton Therapy Keeps Patient Data Safe and Available

Seattle Proton Therapy turned to Dell EMC Data Protection to solve an immediate capacity need for backing up their patients’ medical records while complying with government regulations like HIPAA. They found the Dell EMC IDPA DP4400 appliance easy to deploy, with a minimal learning curve for their admins. With excellent deduplication, they continue to save space, and they’ve reduced the time to access crucial data from 1 to 2 weeks to a matter of minutes.

Watch Online
NEWS
The Annie E. Casey Foundation Success Story: Powerful PAM in the Cloud

“The cloud cost was less than having it on-prem. We reduced our servers by 85%. We don’t have to patch the servers or worry about a breach.”

Watch Online
NEWS
Cybersecurity Insights: John Pescatore

At the "Cybersecurity Insights: Security in the Digital Era" event, John Pescatore, Director at SANS Institute, discusses how infrastructure and security have always been linked, but not particularly successful. Why has it failed and what must happen now?

Watch Online
NEWS
Why you should care more about your email security?

Email is the number one threat vector for delivery of malware into organizations. Stephen Dane, Managing Director, Cybersecurity, APJC, Cisco, explores the current state of the challenges that security practitioners face, and what CISOs can do to reduce the risk that email threats pose.

Watch Online
NEWS
Bring on the future — Eugene Kaspersky talks about the recent re-branding

The company founder explains the main changes behind Kaspersky’s new brand, and also talks about why now is the right time to do it.

Watch Online
NEWS
Cisco Stealthwatch - network and cloud threat detection

It should be: With today's attack landscape, continuous threat detection and monitoring is a must-have, not an option. See how Stealthwatch can help by analyzing your entire network traffic, on-premises or in the cloud. It reduces massive data sets to high-fidelity alarms using behavioral modeling, machine learning and Talos threat intelligence.

Watch Online
NEWS
Protecting the frontlines of cybersecurity from nanoscale to enterprise-scale

By 2021, it’s estimated that cybercrime will cost the world economy more than $6 trillion. In our hyper-connected world, every device is storing and computing data making it a potential touch point for intrusion by a cybercriminal, ransomware, or malware. Understanding the shifting threat landscape is crucial to safeguarding data. This is why Hewlett Packard Enterprise is building security into everything we do. Explore how security innovations from Hewlett Packard Labs make into product roadmaps and find out what top IT security trends and challenges to look out for in the near to longer term.

Watch Online
NEWS
Cyprus University protects students and staff with Cisco firewalls

Cyprus University of Technology deployed Cisco Next-Generation Firewalls and Cisco ISE to proactively block threats and protect 625 staff and 4,000 students.

Watch Online
NEWS
Operation ShadowHammer: Costin Raiu and Vitaly Kamlyuk at #TheSAS2019

In this talk, delivered at the main stage of the Security Analyst Summit 2019 in Singapore, Costin Raiu and Vitaly Kamlyuk reflect on the discovery of #ShadowHammer - a #supply-chain attack that affected thousands of #ASUS computers.

Watch Online
NEWS
Enhanced Security Network Empowers Federal Technology Integration Firm

Software-defined networks combine the power of machine learning and AI to protect government data against ever-evolving cyber threats.

Watch Online
NEWS
Paul Hooper discussing "Secure"

Gigamon CEO Paul Hooper shares his thoughts on the critical need to "Secure" your enterprise network.

Watch Online
NEWS
Cisco Security HOWTO : Threat Hunting : Olympic Destroyer

Let us surprise you with what Cisco Threat Response can do. Here are two must-see videos to explain a potential use case for what it's all about and why you need it.In this series of videos, we investigate how to perform common SOC tasks using Cisco tools.

Watch Online
NEWS
From fashion to mass market: Verisium

How to start generating revenue and convince the investors that your startup idea was right? In this episode we’re meeting with Verisium, a startup that focuses on providing authenticity checks for goods using NFC and blockchain, as they aspire to scale their sales through partners in fashion retail business. This startup is supported by Kaspersky Lab Incubator.

Watch Online
NEWS
RSA Helps You Manage Everyday Digital Risks

Through everyday tasks, you encounter digital risk. See all the ways that RSA Business-Driven Security solutions help protect consumers and enable digital risk management for businesses.

Watch Online

News

ASX Sports, the world’s first fantasy sports platform with live in-game trading founded by Paddy Power, has partnered with Aventus Network as its blockchain provider.
IGEL OS and the IGEL UD Pocket, bundled with expert resources including access to an IGEL Technical Relationship Manager, enables IT organizations to quickly regain control of malware affected devices and ransomware attacks to quickly restore productivity for end-users.
Calls for greater transparency from data centre industry.
Economist Impact survey of 2,000 business leaders, sponsored by Cognizant, shows key challenges include competing priorities, deriving value from technology investments, addressing a talent and skills gap, and sustaining action on ESG.

Expert Opinions

By Chris Vaughan, Area VP and Technical Account Management, EMEA at Tanium
By Marc Zottner and Michael Coté at VMware
By John Atkinson, Director, Sales Engineering UK & I, Riverbed
Dr Nando de Freitas, a lead researcher at Google’s DeepMind, recently grabbed tech headlines with his claim that humanity is closer than ever to creating artificial general intelligence. Although hotly contested by many in the sector, this type of technology would have a profound impact on the business community, its operations and how it approaches customer interactions. Instead of training algorithms on existing data sets, super AI might be able to listen, read emotion and extract information in a way that mimics human understanding.