Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Security risks of Cloud Computing | Threats, Issues and Challenges

Cloud computing is the latest buzzword in the IT world. It's often touted as a cost-saving, high-performance alternative to traditional on-site data storage solutions. But there are risks involved with cloud computing that you need to be aware of before jumping into this new technology! In this video, I'll discuss some different threats, issues and challenges related to security for companies who are considering moving their data up into the cloud or have already done so.

How Human Resources Practitioners Use Egnyte

Director of Global HR Operations, Dee DeWinter, showcases how she utilizes Egnyte to make her job easy, simple, and secure. In this video, she shares how to create and manage workflows, share securely through DocuSign, and set folder permissions within a demo environment. Whether your preference is Microsoft or Google products, you can easily create assets within Egnyte, edit as needed, and benefit from autosave features that make changes immediately available for everyone with access to the file or folder.

Ain't No Mountain High Enough: Achieving Zero Trust For A Mobile Workforce With Art Ashmann (VMware)

Widespread remote work has called for a paradigm shift in how we conduct enterprise cybersecurity. On this week’s Endpoint Enigma, VMware Staff EUC Solutions Engineer, Art Ashmann joins Hank Schless to discuss how mobile and cloud technology have enabled us to manage both work and personal responsibilities from anywhere and what organizations can do to securely take advantage of it.

The Year in Review with the Team at LimaCharlie

Join the fast-growing team at LimaCharlie for an interactive living room style discussion about all that has happened in the last year. Meet key members of the team, learn about new features, the thinking behind them and get a glimpse of what is coming. During the discussion we will touch on the wide variety of capabilities enabled by the platform and how they can change the way that you view cybersecurity tools and infrastructure.