This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions.

Kde se dívat na This Week in Enterprise Tech • Řada 2020

46 dílů

  • Deep Fake Crystal Balls
    D1
    Deep Fake Crystal Balls2020 enterprise predictions, 2019 scorecard
  • Kari's Law is Changing 911
    D2
    Kari's Law is Changing 911SNAKE ransomware, nearly invincible lithium-ion batteries, does low-code mean low security?
  • Tiers for Fears
    D3
    Tiers for FearsHow stable is your application and are you looking at the correct metrics to determine if you need to grow?
  • Brussels Sprout Taxation
    D4
    Brussels Sprout TaxationDigital Taxation at the OECD, Cybersecurity Lessons Learned from 'The Rise of Skywalker', MacOs Threat Won't Go Away
  • Connect the Engine to the Steering Wheel
    D5
    Connect the Engine to the Steering WheelWho will the DOJ blame for robocalls? The effect of international tensions on cybersecurity, end to end e-commerce solutions with AppDirect.
  • VMWare Crystal Ball
    D6
    VMWare Crystal BallCISOs want a better work/home balance, Bluetooth vulnerabilities on Android, challenges to implementing Zero Trust
  • Tissue Paper Security
    D7
    Tissue Paper SecurityThe State of Malware in 2020, US says Huawei has backdoor access, ServerCentral Turing Group and challenges for companies moving to the cloud.
  • Grand Theft Tesla
    D8
    Grand Theft TeslaRing makes two-factor mandatory, jailbreaking Teslas, security pros have bad security habits too.
  • AI Ops and the Hybrid Cloud
    D9
    AI Ops and the Hybrid CloudRSA Red Team preps for election threats, ElectionGuard, U.S. State Dept.'s tips to fight insider threats
  • AT&T Managed Threat Detection and Response
    D10
    AT&T Managed Threat Detection and ResponseLetsEncrypt delays certificate revocations, Coronavirus' impact on economy, AT&T Cybersecurity
  • The Zen of CRM
    D11
    The Zen of CRMMalware taking advantage of Coronavirus fears, gender equality in cybersecurity, how Zendesk's CRM platform helps businesses grow
  • IBM's AI Analyzes the Coronavirus
    D12
    IBM's AI Analyzes the CoronavirusWith the increase of people working from home, is your security team ready?
  • Continuously Delivering Everything with Qentelli
    D13
    Continuously Delivering Everything with QentelliPrasanna Singaraju, Co-Founder and CTO of Qentelli talks about digital transformation and the magic behind Continuous Delivery.
  • Can NetOps and SecOps Live in Harmony?
    D14
    Can NetOps and SecOps Live in Harmony?NetOps+SecOps 1 pane of glass: PathSolutions talks about the issues.
  • TWiET Remote Access Roundtable
    D15
    TWiET Remote Access RoundtableIT and User Remote Access Roundtable the TWiET hosts talk about best practices, things to watch for and taking advantage of this surge in remote access to fix some of your security problems.
  • Log Data Mining with LogDNA
    D16
    Log Data Mining with LogDNA
  • Hypervisor Security with VMware
    D17
    Hypervisor Security with VMwareHypervisor security gotchas: Security futures with VMware
  • C-19 changes MDM for BYOD
    D18
    C-19 changes MDM for BYODContact tracing, election security in the age of social distancing, MDM changes because of C-19
  • Vulnerability & Threat Management With Digital Defense
    D19
    Vulnerability & Threat Management With Digital DefenseDid C-19 Change Cybersecurity?
  • The Once and Future Database
    D20
    The Once and Future DatabaseData Wrangling and Management
  • Remote Work / Back to Work?
    D21
    Remote Work / Back to Work?What Will the Future Bring?
  • Digital Transformation For An Analog World
    D22
    Digital Transformation For An Analog WorldDX: What Can It Really Do?
  • Salesforce: Low Code Solutions
    D23
    Salesforce: Low Code SolutionsHow They Fit Into the Enterprise.
  • Mind Your Devices With MDM
    D24
    Mind Your Devices With MDMImplementation and Security Usage
  • Cooking Up DevSecOps and Compliance Recipes with Chef
    D25
    Cooking Up DevSecOps and Compliance Recipes with ChefCompliance Recipes With Chef
  • DNS Over SSL and Fighting Misinformation
    D26
    DNS Over SSL and Fighting MisinformationFirefox and Comcast Burying the Hatchet
  • Automatic for the DevOps
    D27
    Automatic for the DevOpsBest and worst hacks of 2020 so far, police hack the hackers and bust a crime network, InfoSec job trends and we talk to env0 about the woes of DevOps.
  • Just Clouding Around With Serverless
    D28
    Just Clouding Around With ServerlessWho would have thought the pandemic would drive biometrics, cybersecurity in schools comes up short and we talk about how serverless can solve our DevSecOps problems.
  • Malware Behind the Curtain
    D29
    Malware Behind the CurtainWhat's the reality of malware?
  • Forbidden Whaling
    D30
    Forbidden WhalingAutomation and orchestration of your DevOps World with F5 Networks
  • Security Standards not Found
    D31
    Security Standards not FoundHuawei Technologies USA CSO, Andy Purdy
  • How Agile is Your Business?
    D32
    How Agile is Your Business?What is a Secure Borderless Workspace?
  • Rocks & Pebbles of Wi-Fi 6
    D33
    Rocks & Pebbles of Wi-Fi 6Wi-Fi 6 and Wi-Fi 6e Roundtable
  • Land of the Fee
    D34
    Land of the FeeWhat's up with 5G fees, Makers step up for first responders, how COVID-19 has changed IT
  • May The Salesforce Be Available To You
    D35
    May The Salesforce Be Available To YouWhat is a Chief Availability Officer? Foiled ransomware attack on Tesla, redefining CISO success
  • IoT It!
    D36
    IoT It!Moving IoT from hobby to the enterprise.
  • See Spot Cloud
    D37
    See Spot CloudMicrosoft thwarts spying attempts on US campaigns, DiceKeys a box for passwords, Cloud Analytics Tools
  • Your Next.js Workflow
    D38
    Your Next.js WorkflowRansomware's first fatality, Deepfake defense, refocusing front end performance with Vercel
  • How Solid is Your Storage?
    D39
    How Solid is Your Storage?Ransomware impacts lives, getting companies on the same page with DevSecOps, and the future of solid-state storage in enterprise.
  • The Death Of Email
    D40
    The Death Of EmailUser Acceptance Testing(UAT), paying ransomware might be illegal, office communication with Workstorm.
  • Data on Cloud 9
    D41
    Data on Cloud 9SDWAN Worth the BIG Upgrade?
  • Digital Identity Crisis
    D42
    Digital Identity CrisisPrime Day Phishing Attacks, the Return of Emotet, and WFH Security
  • Cloud Is A Bag Of Cats
    D43
    Cloud Is A Bag Of CatsRussian hackers charged by U.S., Software Crowdtesting, IBM Cloud
  • This Week in Enterprise Tech #417
    D44
    This Week in Enterprise Tech #417
  • This Week in Enterprise Tech #418
    D45
    This Week in Enterprise Tech #418
  • This Week in Enterprise Tech #419
    D46
    This Week in Enterprise Tech #419

Získat Plex na Vaše zařízení

Zdarma na 20+ platformách. Vyberte tu svou.
Zobrazit všechna podporovaná zařízení →