Palo Alto Networks: Bridging the Gap between Cloud Security and the SOC
Preventing Account Takeovers in Cloud Applications
Guardz: Empower MSPs to Secure & Insure Small Businesses
Trends and Threats: Rapid7's 2024 Cybersecurity Findings
Trend Micro: How to Facilitate Difficult Discussions with C-Level Executives
Tackling SOC Analyst Burnout
Pimcore: How to Master Data and Experience Management in the AI Age
Abnormal Security: Protecting Human Vulnerabilities with Human Behavior AI
Maximizing Data Relationships with Text Analytics: LLMs and Knowledge Graphs
Bots Unleashed: How ChatGPT's Insights Fuel Automated Manipulation
Mastering Infrastructure Management
Data Transforming Business
The Next Phase of Cybersecurity
Tokenisation vs encryption: How plaintext data is fuelling the ransomware boom
Why is Edge Computing the missing puzzle piece of decentralisation?
GitGuardian: Secrets in the Source Code Need Protection
Secureworks: XDR in a Hybrid World
NFON: Improving CX Through Scalable UCaaS in the Modern Omnichannel Contact Centre
IWD Podcast: Unconscious or implicit, they mean the same thing #BreakTheBias
Vertica: Advanced Analytics is the Future of Data
The Bridge Episode 3: Optimising Application Experience
The Bridge Episode 2: End to End Security