ComputerWeekly.com Research Library

Powered by Bitpipe.com

Multimedia

  • Digital Workplace - Navigating Success With Windows 11

    Sponsored by: SCC and Microsoft  | Premiered: Dec 7, 2024

    Though they offer great flexibility, hybrid work and the digital workplace present certain security and management challenges. Along with breaking down those issues,

  • Global Cyber Policy Radar: 2025 and Beyond

    Sponsored by: NCC Group  | Premiered: Dec 7, 2024

    A turbulent time in geopolitics is complicating the cybersecurity landscape and prompting reevaluation of current regulations. Join NCC Group’s experts, the professionals who play an instrumental role in the shaping of global cybersecurity laws, as they discuss what to look out for in 2025 and beyond.

  • CyberArk Labs Deconstructing Attacker Methods in Recent Breaches

    Sponsored by: CyberArk  | Premiered: Dec 6, 2024

    During this webcast, you’ll learn about three cautionary tales from the real world that detail how threat actors abused privileged access. Tune in now to familiarize yourself with the anatomy of a modern cyberattack and learn how you can keep your business safe.

  • Modernize Your PAM Program for a Multi-Cloud World

    Sponsored by: CyberArk  | Premiered: Dec 4, 2024

    During this webcast, you’ll learn about modern PAM strategies that are designed to reduce standing privileges and minimize security gaps. Then, you’ll find out how the just-in-time paradigm enables you to get users access to the things they need with the right level of privileges for the right amount of time. Tune in now to learn more.

  • AI by the Numbers: Cracking the GenAI Code for Business Growth with Dataiku and Databricks

    Sponsored by: Dataiku  | Premiered: Dec 4, 2024

    This webcast shares insights from an annual survey from Dataiku and Databricks that builds on last year's insights and reveals how organizations are evolving their GenAI usage. From shifting budget priorities to discovering new use cases, the report provides a comprehensive view of the rapidly changing GenAI landscape. Tune in now to learn more.

  • Risk Mitigation Best Practices Based on Recent Breaches

    Sponsored by: CyberArk  | Premiered: Dec 3, 2024

    Recent security breaches are shaping the way the security landscape looks moving forward. In this webcast, CyberArk Senior Offensive Security Research Evangelist, Andy Thompson, sits down with CyberArk Field CTO, David Higgins, to discuss risk mitigation best practices based on recent breaches. Watch now to learn more.

  • Prioritizing security: Essential strategies for IT leaders

    Sponsored by: Red Gate Software  | Premiered: Nov 28, 2024

    In today's rapidly evolving landscape, managing the security of large and complex database estates is a critical challenge for organizations. Join members of Redgate's Information Security Group, headed up by Damon Witherick (Director of

  • AI-driven Secure Networking

    Sponsored by: NTT DATA AND CISCO  | Premiered: Nov 27, 2024

    In this webcast, NTT DATA Networking, Gary Middleton - Vice President, Networking GTM NTT DATA - sits down with Hugo Padilla Prad - Director Sales, EMEA Cisco Networking - for a discussion about the role of AI in network security. Watch the webcast now to witness the full discussion, and gain insight into key customer success stories.

  • Storyblok GmbH Video

    Sponsored by: Storyblok GmbH  | Premiered: Nov 23, 2024

    As AI continues to advance, more and more industries are looking for new ways to integrate the technology into their daily operations. However, not everyone’s on board with AI, and many content leaders can be hesitant to adopt it. Tune into this webinar to learn more.

  • Wired Briefings

    Sponsored by: DataBricks  | Premiered: Nov 23, 2024

    During this webcast, you’ll find out how a unified data management platform can help you eliminate silos and standardize your data to unlock AI’s potential. Tune in now to learn how you can navigate the challenges of becoming a data-driven organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.