Palo Alto Networks: Bridging the Gap between Cloud Security and the SOC
Preventing Account Takeovers in Cloud Applications
Guardz: Empower MSPs to Secure & Insure Small Businesses
Trends and Threats: Rapid7's 2024 Cybersecurity Findings
Trend Micro: How to Facilitate Difficult Discussions with C-Level Executives
Tackling SOC Analyst Burnout
Pimcore: How to Master Data and Experience Management in the AI Age
Abnormal Security: Protecting Human Vulnerabilities with Human Behavior AI
Maximizing Data Relationships with Text Analytics: LLMs and Knowledge Graphs
Bots Unleashed: How ChatGPT's Insights Fuel Automated Manipulation
Mastering Infrastructure Management
Data Transforming Business
The Next Phase of Cybersecurity
Radiant Logic: The challenges of identity sprawl
StreamSets: How to set up your data democratisation strategy
Immersive Labs: Democratising access to cybersecurity
Beyond Identity: CIAM and Hitting a Balance Between Security and Customer Friction
Ampito: How Can Technology Modernise Working Practices?
Phishlabs: Social media as a threat channel
Findability Sciences: Why Should We Be Using Wide Data for AI?
The Bridge Episode 4: Secure Agile Networks
Technimove: The Science Behind Cyber Security & Cyber Resilience