Quantum hurdles: an optimistic view of post-quantum security
Sander Dorigo (Fox Crypto) - Presentation from SECCON NL 2022
In Latest Videos
Leading a Resilient Enterprise
Lt. Gen. Deependra Singh Hooda, Indian Army, on solid, real-life, innovative strategies to build a resilient organization, and the role of leaders in driving it.
Configure a Data Policy to Overwrite a Control Policy
In this video, we step through how to configure a data policy to complete the task: Users from Sites in Region 1 must access AWS networks through DC in Region 2. Everything else must flow via DC on Region 1. Tags: SDWAN, data-policy, control-policy
STADA supports global hybrid work model
Cisco and partner MDS helped enable a safe, flexible and efficient hybrid work model for STADA globally. Cisco SD-WAN provided a centralized, simplified operational model with Cisco SASE architecture, to help secure access and applications for users.
Cisco HyperFlex for the edge with AMD EPYC processors
Cisco HyperFlex with AMD EPYC processors can power applications wherever you need them and is managed from the cloud with Cisco Intersight. Together, it’s a powerful, perfect match.
Encryption is on the Rise! Learn How to Balance Security with User Privacy and Compliance
Join this panel discussion to learn more about: -Details surrounding the rise of encrypted traffic -Sources and meaning of mandates for internal and external compliance -Different approaches to managing encrypted data/traffic
Five things to consider in evolving and maturing your organization’s security
The saying “a good offense is the best defense” is true for sport and cybersecurity. But offensive positions cannot be static -- keeping an offense strong requires agility. Learn how to maintain a strong, agile security posture.