AT&T
Is one of your New Year's resolutions to reduce your cyber risk in 2019? If so, do you know where to start? Join us for this special session webcast, in which we'll discuss the building blocks that make for an effective security and compliance program for organizations of any size.
Watch Now
Python is the second most popular language and is very easy to start using. It is almost a de-facto standard in machine learning. Here be dragons!
Many machine learning (ML) models are Python pickle files under the hood. The use of pickling conserves memory, enables start-and-stop model training, and makes trained models portable (and, thereby, shareable).
Watch Now
Dell EMC
On Monday, Dec. 11, as part of the SIA Webinar series, a webinar titled Cybersecurity: Bridging the Gap between Physical Security and IT/IoT covered best practices from edge to core hardening, bridging cyberprotection techniques, and technologies that help unify disparate technologies into a common cybersecurity framework. Speakers Vince Ricco (Axis Communications) and Ken Mills (Dell EMC) discussed how successful practitioners are hardening the physical security edge, enabling the authentication of devices systemwide and utilizing IT and IoT methodology to secure the enterprise.
Watch Now
Alert Logic
Companies of every size and across every industry need to have the solution to defend against cyber attacks. For medium-sized and budget-constrained companies especially – the array of security technologies and solution and the volume of cyber threats can make the challenge seem overwhelming. Organizations suffer trying to manage raw data, security events and false positive incidents with limited context, overworked staff, and a lack of threat landscape knowledge. There is a better way to improve your security without the time, effort, and cost of purchasing and integrating multiple tools, a traditional SIEM or expensive traditional security outsourcing vendors.
Watch Now