What is Reinforcement Learning (RL)? Definition, Algorithms, Examples
With organizations poised to spend more than $5B+ on endpoint security software this year, it raises the question: What should enterprises be asking from security vendors, and how can they parse signal from all the marketing noise?
In this podcast series, hosted by freelance analyst Bob Tarzey, he speaks to Ian McShane who as a former Gartner analyst focuses on the endpoint security market. Ian McShane has written extensively about the failure of antivirus vendors to defend against modern attacks, and the marketing hype surrounding “next-gen” antivirus.
Part 2 – What’s Next for Endpoint Security? In the previous episode, Bob Tarzey spoke to VP and endpoint security expert from Endgame, Ian McShane, about the history of endpoint security and why it needs to play an integral role for companies. In this second podcast, Bob and Ian look at the future of endpoint security and the next steps that need to be taken. This involves looking at whether security teams will have to learn new skills and also the importance of the MITRE ATT&CK framework. Like this podcast? Check out the pervious episode!
Join 34,209 IT professionals who already have a head start
Meet the panel
Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation
Fivetran: The Biggest Challenges Facing Data Leaders Today - And How to Solve Them
Informatica: Harnessing Data, AI and Cloud for a 360-Degree View of your Business
Zero Networks: Reinventing Identity Security
Fivetran: Modern Data Leader’s Guide to Improved Customer Outcomes
Radware: 360 Application Protection and Why Companies Need It
HID Global: Choosing the Right Visitor Management Solution
Huntress: Doing More With Less in Your Cybersecurity Strategy
Savvy: SaaS Identity Discovery and Visibility
Sifflet: Data Observability 101