NEWS

   

EVENTS

Conferences

The RSA Conference 2020

THE RSA CONFERENCE 2020

July 15-17, 2020
RSA Conference has been a driving force behind the world’s cybersecurity agenda. The central point where people from around the world gather to share, learn and grow. And the place that provides a forum for innovation and partnership. It’s even more important today to have these points o...

Enterprise Connect Conference & Exhibit

ENTERPRISE CONNECT CONFERENCE & EXHIBIT

August 03-06, 2020
Enterprise communications and collaboration decision-makers and business leaders face daunting new challenges: Emerging technologies like the Cloud, Team Collaboration and Speech Technologies promise to disrupt the environment, while end users and customers continue to demand new tools and media. On...

7th annual SANS Security Awareness Summit

7TH ANNUAL SANS SECURITY AWARENESS SUMMIT

August 05-06, 2020
SANS Security Awareness Summit is on and we're getting ready for our biggest and best Summit yet! Every year, we strive to provide the very best forum for security awareness officers looking to take their program to the next level! Our promise is to provide actionable lessons you can take back a...

Digital Infrastructure Investment for the 2020s

DIGITAL INFRASTRUCTURE INVESTMENT FOR THE 2020S

August 10-10, 2020
This half-day seminar, hosted by Breakfast Media, seeks to bring together the broadband infrastructure and financial communities to fill a crucial gap: the lack of existing conferences that provide all stakeholders in the broadband community with a focus on the digital infrastructure and investment ...

AWS re:Inforce 2020

AWS RE:INFORCE 2020

June 29-01, 2020
Due to the continued concerns about COVID-19, Amazon Web Services has cancelled AWS re:Inforce 2020, scheduled for June 29 – July 1 in Houston, TX. We've reached this decision after much consideration, as the health and safety of our customers, partners, and employees are our top priority....

Critical National Infrastructure

CRITICAL NATIONAL INFRASTRUCTURE

June 15-17, 2020
In 2020, the Critical National Infrastructure Summit is keeping interoperability at the core of its agenda. We’re including even more sectors within critical infrastructure to cater to the need for community collaboration in emergency response, resiliency and risk management efforts.CNI 2020 i...

Advancing Cybersecurity Risk Management Conference

ADVANCING CYBERSECURITY RISK MANAGEMENT CONFERENCE

May 27-28, 2020
Building on the 2018 NIST Cybersecurity Risk Management Conference, this joint gathering of practitioners, policy makers, and researchers aims to expand the community’s sharing and exploration of best practices. The conference also will enable NIST to receive and discuss stakeholder input on k...

Connect (X) is the leading 5G infrastructure event in North America

CONNECT (X) IS THE LEADING 5G INFRASTRUCTURE EVENT IN NORTH AMERICA

May 18-21, 2020
Connect (X) is the leading 5G infrastructure event in North America, convening executives from commercial carriers, fixed and mobile network operators, enterprises and their infrastructure partners to invest, design, deploy and operate next generation public and private 5G networks.

 

Webinars

JUL 02, 2020 | 10:00 AM
THE CCPA ENFORCEMENT ERA BEGINS: WHAT TO EXPECT FROM CALIFORNIA’S PRIVACY ACT
Following the introduction of the EU GDPR in 2018, the state of California introduced its own data security act this year, offering privacy standards for its consumers. Officially launched in January, the CCPA has been broadly welcomed across the industry as a refreshing take on data priva...
JUL 16, 2020 | 10:30 AM
ATTACKING AND DEFENDING CLOUD NATIVE INFRASTRUCTURE
Andy has made mistakes. He's seen even more. And in this talk he details the best and the worst of the container and Kubernetes security problems he's experienced, exploited, and remediated. This talk details low level exploitable issues with container and Kubernetes deployments. W...
JUL 21, 2020 | 1:00 PM
MEASURING AND IMPROVING CYBER DEFENSE USING THE MITRE ATT&CK FRAMEWORK
Through the ATT&CK framework, MITRE has generated a gold mine of information about the most important tactics and techniques used by attackers and how the blue team can detect and prevent these actions. Blocking atomic attack indicators such as domain names and IP addresses might work ...
JUL 24, 2020 | 11:00 a.m
TAMING THE IT INFRASTRUCTURE MONSTER IN 5G NETWORKS
As communications service providers (CSPs) begin deploying 5G, they will leverage Network Functions Virtualization (NFV) where software is disaggregated from hardware. However, NFV implies a shift in end-to-end validation responsibility from equipment vendors to system integrators or CSPs ...
AUG 19, 2020 | 1:00 PM
REAL-WORLD USE CASES OF METRICS THAT DEMONSTRATE EFFECTIVE SECURITY PRACTICES
This webcast takes a deeper dive into the topics explored in the SANS 2020 Metrics Survey to detail real-world use case examples of businesses selecting and using security metrics. Each speaker will detail a customer example of security metrics that helped reduce the risks posed by use of ...
SEP 02, 2020 | 3:00 pm
THREAT HORIZON 2022: DIGITAL AND PHYSICAL WORLDS COLLIDE
The digital and physical worlds are on an irreversible collision course. By 2022, organisations will be plunged into crisis as ruthless attackers exploit weaknesses in immature technologies and take advantage of an unprepared workforce. At the same time, natural forces will ravage infrastr...

TOP 10 TIPS FOR SCALING YOUR IT INFRASTRUCTURE ON-DEMAND WEBINAR
In this on-demand webinar, the Vice President of IT at LogMeIn will cover the top 10 tips for scaling your IT infrastructure to meet the growing and changing needs of your organization. Walk away with clear guidance around the best practices for your IT team to implement so that your comp...
ON-DEMAND WEBINAR: THINKING LIKE A CYBER CRIMINAL: STRATEGIES TO KEEP YOUR COMPANY SECURE:
In this on-demand webinar, we’ll discuss cybercriminals’ organization, motivation, and methods of attack as well as provide a blueprint for combatting these attacks. Walk away from this presentation with insight into how cybercriminals will attempt to attack your organization as well as cl...
ON-DEMAND WEBINAR: 5 REASONS WHY A PEOPLE-CENTRIC SECURITY STRATEGY SAFEGUARDS SENSITIVE INFORMATION AND FACILITATES COMPLIANCE
Users often ignore internal security controls in order to get work done quickly. This puts the security of confidential information at risk. Tune in to this webinar to learn why a people-centric approach to security is the best way to protect your company’s sensitive data and IP, to achiev...
ON-DEMAND WEBINAR: KEY CONSIDERATIONS FOR SAAS SECURITY AND PERFORMANCE
Companies are turning to Software as a Service (SaaS) to ease their cloud transformation and increase agility. According to a Bettercloud survey, 73% of all companies say that nearly all of their apps will be SaaS by 2020. SaaS offers speed to market, great functionality, and lower IT oper...
ON-DEMAND WEBINAR: SIMPLIFYING WIN10 MIGRATION AND ACCELERATING DEPLOYMENT
With support for Windows 7 coming to an end, it’s time to simplify and accelerate your migration to Windows 10. Attend this webinar and learn how you can overcome some of the biggest Windows 10 migration headaches including application incompatibilities, more frequent O.S. updates, and man...
SECURING YOUR ENDPOINTS WITH LOGMEIN ANTIVIRUS
In this On-Demand Webinar, our expert Solution Engineer, Kyle Dickerson, shared when and how to use the most important features within LogMeIn Antivirus, in addition to important security advice to keep your IT infrastructure safe. We dove into the core functionality and latest updates ins...

RESOURCES

Enterprises running hypervisors on hyper-converged infrastructure (HCI) systems typically have backup options available to them that are not available to those running on generic hardware. Such custom...

Data science and big data analytics have become the new must-haves for businesses across many industries. Gone are the days when algorithm development and large-scale data mining were confined to Sili...

IT infrastructure scaling is when the size and power of an IT system are scaled to accommodate changes in storage and workflow demands. Infrastructure scaling can be horizontal or vertical. Vertical s...

DApps (sometimes called Dapps) are from the blockchain universe and so, logically, the apps part stands for application (obviously) and the D part stands for decentralised (only obvious once you know ...

Pacific Electric Wire & Cable Co. (PEWC) is a manufacturer in Taiwan with subsidiaries in China, Singapore, Thailand, and Australia. Like many companies, they had been facing the looming change ov...

Hybrid IT is the operational model sought and used by most large businesses. For the on-premises portion, the difficulty is ensuring it can be deployed with the ease and financial model of the public ...

COVID-19 has altered our world. In this series of stories, Data Center Frontier explores the strategic challenges the pandemic presents for the data center and cloud computing sectors as we navigate t...

With infrastructure as code (IaC), you write declarative instructions about compute, storage and network requirements for the infra and execute it. How does this compare to platform as code (PaC) and ...

One of the most exciting areas of Vubiq Network’s innovative millimeter wave technology is in the application of ultra high-speed, short-range communications as applied to solving the scaling co...