Entrepreneur

Dec
12

Ransomware 2.0 eSummit

Implementing proper backup systems and processes, encrypting sensitive data, and training employees to be on the lookout for phishing are just some techniques that can help keep your organization protected

By admin |
DETAIL
Oct
17

Cloud Security 2.0 eSummit

A clear and strong identity management process and plan is critical in this turbulent time. As hybrid enterprise solutions evolve, including cloud and on-premises software, the need for stronger identity management and identity-as-a-service is a must.

By admin |
DETAIL
Oct
10

A FREE virtual summit for Christian educators

These sessions focus on practical ways to make a bigger difference – shining God’s love and the light of His truths into your classroom – regardless of where you teach.

By admin |
DETAIL
Nov
21

Endpoint Security eSummit

This makes everything connected to your network a jungle of endpoints, each one presenting its own security risks to the enterprise

By admin |
DETAIL
Oct
03

Application Security 2.0 eSummit

The increasing variables under which users use applications across various networks, in the cloud and in a generally perimeter-free nature

By admin |
DETAIL
Oct
24

Blind Spots in Teacher Professional Development

Education Week reporters and their expert guests took a deep dive with you, the
readers, into some of the most prevalent problems with and oversights in PD, and offered ideas for
fixing them

By admin |
DETAIL
Dec
05

Vulnerability Assessments eSummit

All Is Not Quiet on the Cybersecurity Front: A View of Vulnerability Management From the Trenches

By admin |
DETAIL
Jul
11

Data Enrichment for Email: Five Things You Need to Do

Most marketing is already driven by data that enhances the customer experience. But not all email marketers are fully utilizing that data to enrich their messages and achieve their business objectives

By admin |
DETAIL
Page 1 of 14612345...102030...Last »