Saul Mulcrow

Fireside Chat: End-to-End Monitoring: Volume 2 Feedback Form

Feedback Form Thanks for joining us for the recent End-to-End Monitoring: Volume 2 – Cisco Updates Shaping Splunk, AppDynamics, and ThousandEyes ! We’d love to hear your thoughts and would greatly appreciate it if you could take a few moments to complete a quick ‘constructive feedback’ survey. Your insights will help us improve our future […]

Fireside Chat: End-to-End Monitoring: Volume 2 Feedback Form Read More »

The Human Factor Exposed:5 Common Mistakes in Securing Healthcare from Cyber Risks | Feedback Form

Feedback Form Thanks for joining us for the recent The Human Factor Exposed: 5 Common Mistakes in Securing Healthcare from Cyber Risks! We’d love to hear your thoughts and would greatly appreciate it if you could take a few moments to complete a quick ‘constructive feedback’ survey. Your insights will help us improve our future

The Human Factor Exposed:5 Common Mistakes in Securing Healthcare from Cyber Risks | Feedback Form Read More »

Securing and Ensuring Data Sovereignty: Securing AI – Episode 4

Video Securing and Ensuring Data Sovereignty: Securing AI Episode 4 Series Overview Video Summary This video explores the growing integration of generative AI tools, such as ChatGPT, GitHub CoPilot, and Grammarly, within organisations, and how businesses can effectively manage and secure their use. The discussion highlights the challenges associated with AI’s data handling, particularly in

Securing and Ensuring Data Sovereignty: Securing AI – Episode 4 Read More »

Securing and Ensuring Data Sovereignty: Data Movement – Episode 2

Video Securing and Ensuring Data Sovereignty: Data Movement Episode 2 Series Overview Video Summary In this video, we explore how Netskope’s advanced Data Loss Prevention (DLP) solution offers comprehensive security coverage across various channels, ensuring data is protected wherever it resides or moves. From web traffic to endpoints, email attachments, and cloud applications like OneDrive,

Securing and Ensuring Data Sovereignty: Data Movement – Episode 2 Read More »

Securing and Ensuring Data Sovereignty: Control Insider Risk – Episode 3

Video Securing and Ensuring Data Sovereignty: Control Insider Risk Episode 3 Series Overview Video Summary In this video, we walk through the process of managing user and device risk within an organisation, focusing on data protection and compliance requirements. The session highlights how contextual controls, device compliance, and behavioural analytics can work together to secure

Securing and Ensuring Data Sovereignty: Control Insider Risk – Episode 3 Read More »

Securing and Ensuring Data Sovereignty: Data Centre Access

Video Securing and Ensuring Data Sovereignty: Data Centre Access Episode 1 Series Overview Video Summary This video provides an in-depth look at Netskope Private Access (NPA) and how it enables Zero Trust Network Access (ZTNA) for secure, seamless remote access to private applications. Traditional VPNs often grant full network access, increasing security risks, whereas ZTNA

Securing and Ensuring Data Sovereignty: Data Centre Access Read More »

Simulating Real-Time Water Treatment Monitoring with Confluent and Splunk

Video Simulating Real-Time Water Treatment Monitoring with Confluent and Splunk Episode 2 Contact Us Video Summary This demo showcases real-time data streaming from Confluent into Splunk, using simulated water treatment sensor data along the River X. The dashboards provide an overview of treatment plants, river flow, and capacity levels, helping predict and mitigate overflow risks.

Simulating Real-Time Water Treatment Monitoring with Confluent and Splunk Read More »

Varonis Explained – 24/7 Threat Detection and Response

Video Varonis Explained – 24/7 Threat Detection and Response Episode 7 Series Overview Video Summary Varonis’ Managed Data Detection and Response (MDDR) service provides 24/7 protection, ensuring continuous coverage 365 days a year. This optional service combines Varonis’ award-winning threat detection capabilities with a dedicated team of cyber experts who investigate and respond to threats

Varonis Explained – 24/7 Threat Detection and Response Read More »

Fireside Chat: End-to-end Monitoring with Splunk, AppD and ThousandEyes | Feedback Form

Feedback Form Thanks for joining us for the recent Fireside Chat: End-to-end Monitoring with Splunk, AppD, and ThousandEyes! We’d love to hear your thoughts and would greatly appreciate it if you could take a few moments to complete a quick ‘constructive feedback’ survey. Your insights will help us improve our future content. As a token

Fireside Chat: End-to-end Monitoring with Splunk, AppD and ThousandEyes | Feedback Form Read More »

Scroll to Top