VIDEO

From threats to protection technologies

  • Published in

Building security technologies that allow us to detect sophisticated targeted attacks is a much more complicated task then creating another extension for an anti-virus. It is not just about a new malware on a given PC or mobile device. It is about looking at the cyber landscape on a much larger scale. It involves analyzing not just the separate files but the whole data flow. Distinguishing thousands of patterns, detecting the usual ones and those that shouldn't be there.

Read More



VIDEO

RSAs Niloofar Razi Howe & Zulfikar Ramzan on the Future of the Market at RSA Charge 2016

  • Published in

Niloofar Razi Howe and Zulfikar Ramzan offer their insights and predictions for the information security and risk management markets at RSA Charge 2016.

Read More



John Wilson, Senior Fellow, Threat Research at Fortra, discusses the company’s recent 2023 report...
Mark Jow, Technical Evangelist EMEA, Gigamon, explains how Gigamon Precryption technology addresses...
Eric Herzog, Chief Marketing Officer at Infinidat, discusses the Brittle, Anxious, Non-linear,...
There’s a view that ‘traditional’ endpoint protection has become a commodity. You can use...
In your enterprise digital transformation journey, find out the essential elements to put security...
From Hardware Shield to Zero Trust Architecture, Intel's Baiju Patel and Microsoft's Dave Weston...
Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more