NEWS
Operation ShadowHammer: Costin Raiu and Vitaly Kamlyuk at #TheSAS2019

In this talk, delivered at the main stage of the Security Analyst Summit 2019 in Singapore, Costin Raiu and Vitaly Kamlyuk reflect on the discovery of #ShadowHammer - a #supply-chain attack that affected thousands of #ASUS computers.

Watch Online
NEWS
Enhanced Security Network Empowers Federal Technology Integration Firm

Software-defined networks combine the power of machine learning and AI to protect government data against ever-evolving cyber threats.

Watch Online
NEWS
Paul Hooper discussing "Secure"

Gigamon CEO Paul Hooper shares his thoughts on the critical need to "Secure" your enterprise network.

Watch Online
NEWS
Cisco Security HOWTO : Threat Hunting : Olympic Destroyer

Let us surprise you with what Cisco Threat Response can do. Here are two must-see videos to explain a potential use case for what it's all about and why you need it.In this series of videos, we investigate how to perform common SOC tasks using Cisco tools.

Watch Online
NEWS
RSA Helps You Manage Everyday Digital Risks

Through everyday tasks, you encounter digital risk. See all the ways that RSA Business-Driven Security solutions help protect consumers and enable digital risk management for businesses.

Watch Online
NEWS
The labyrinth of clues

Costin finds an IP address in Sweden, so he calls David, who is based in Stockholm, to ask him to further investigate this. According to the investigation, the attackers don't seem to be from Sweden but only trying to confuse the researchers and avoid being discovered.

Watch Online
NEWS
How to Embrace Risk to Drive Innovation

Watch as RSA's Steve Schlarman talks with Tamara McCleary about the new risks created through digital transformation and how organizations can manage them in order to drive innovation.

Watch Online
NEWS
Customer Spotlight: SkiStar

A leading Alpine resort operator in Scandinavia and the Alps, Stockholm-based SkiStar is focused on creating a memorable mountain experience for every guest. From finding the ideal holiday package to buying digital lift tickets and sports gear, nearly every aspect of SkiStar's business relies on its network. "Our entire business depends on the network. It handles payments on the e-commerce side as well as payments from on-site ticket sales, hotels and retail transactions. We also issue our ski tickets with an RFID tag that must be validated at all points of entry and at the lifts in our resorts. If our network is corrupted by a cyberattack, it would disrupt revenue streams and create a very bad impression on our guests," said Peter Larsson, SkiStar’s CIO/IT chief.

Watch Online
NEWS
5 Enterprise Cybersecurity Trends You Need to Know

Are businesses losing the fight against cyberattacks? How can businesses change the cybersecurity paradigm?

Watch Online
NEWS
Tackling Cyber threats in Retail

Our experts discuss the cyber threats facing the Retail industry and how you can get a better view of the threats your business faces.

Watch Online
NEWS
Report: Securing the Cloud, Mobile and IoT

Threat actors are able to keep one step ahead by targeting the weakest points in an organization’s IT infrastructure – the cloud, mobile and IoT.

Watch Online
NEWS
What is a CASB?

What is a Cloud Access Security Broker (CASB)? This is the question many IT security teams are asking as they prepare to secure cloud applications like Office 365, Salesforce, and AWS.

Watch Online
NEWS
MSPs Share Their Thoughts on AI/Machine Learning

As these MSPs will attest, artificial intelligence and machine learning are important to helping them solve the challenge of delivering security services to an SMB market that is overconfident when it comes to cybersecurity preparedness. Their words exemplify the value MSPs are gaining when attending Webroot Forums across the nation.

Watch Online
NEWS
Customer Spotlight: Temple University

Temple University was founded in 1884 and is a R1 research institution with over 39,000 students. On a normal day Temple University has over 75,000 devices connected to their network. As a higher-ed institution, Temple needs to operate using an open network environment while protecting and securing their student’s data and research information.

Watch Online

News

The iron-clad cyber defences that will keep manufacturers secure.
Providing partners with a comprehensive enablement journey to security growth.
End-to-end critical power and cooling reference designs for NVIDIA Blackwell architectures up to 7MW, with OCP infrastructure options.
Schneider Electric has signed an agreement to acquire a controlling interest in Motivair, a company specialized in liquid cooling and advanced thermal management solutions for high performance computing...

Expert Opinions

Ben hadn’t considered a career in the Data Centre industry until he saw the advert by BCS on the Government website which ‘sounded really interesting.’ He was the first apprentice to join the company as...
By Rachel Banks, Head of Product Management, Apogee Corporation.
BY Sian Beacham, HR Transformation expert at LACE Partners.