Who Needs Malware?
Learn how fileless techniques work and why they present such a complex challenge.
Detecting cyber attacks as a small to medium business
If security by obscurity is no longer an option, and inaction is a risk in itself, what can smaller enterprises do to protect themselves? Endpoint Detection and Response (EDR) solutions can go a long way towards minimising the level of threat, but they need to be chosen and used in the right way.
Evolving Datacenters without Complexity
In this session, we’ll talk about how IT leaders are advancing the capabilities of their datacenters to rise to today’s challenges. Our guest speaker, Chris Bradford, Product Manager at DataStax will bring first-hand expertise to a discussion with The Register host Elena Perez.
Requirements-driven software development and quality management
A shift is underway in many development teams from traditional delivery models to Agile methods.