Tag: webinar

  • Cloud Blog: What’s new for Google Cloud databases — December 2024

    Source URL: https://cloud.google.com/blog/products/databases/whats-new-for-databases-december-2024/ Source: Cloud Blog Title: What’s new for Google Cloud databases — December 2024 Feedly Summary: As the year winds down and we gather around the (digital) fireplace, the excitement around Google Cloud databases is ramping up! It’s been a busy season of innovation and customer success, and we’ve got a sack full…

  • Anchore: Understanding SBOMs: An Introduction to Modern Development

    Source URL: https://anchore.com/webinars/understanding-sboms-an-introduction/ Source: Anchore Title: Understanding SBOMs: An Introduction to Modern Development Feedly Summary: The post Understanding SBOMs: An Introduction to Modern Development appeared first on Anchore. AI Summary and Description: Yes Summary: This text outlines a live webinar focused on Software Bills of Materials (SBOMs) in the context of software supply chain security,…

  • CSA: Interview: Filling the Training Gap with Dr. Andrews

    Source URL: https://cloudsecurityalliance.org/blog/2024/12/06/csa-community-spotlight-filling-the-training-gap-with-dr-lyron-h-andrews Source: CSA Title: Interview: Filling the Training Gap with Dr. Andrews Feedly Summary: AI Summary and Description: Yes Summary: The Cloud Security Alliance (CSA) is recognized for its contributions to cloud security over the past 15 years, including defining best practices and advancing education in the field. Key initiatives like the Certificate…

  • ISC2 Think Tank: From Impersonation to MFA Bypass: Tackling Today’s Most Sophisticated, Novel Phishing Threats

    Source URL: https://www.isc2.org/professional-development/webinars/thinktank?commid=630141 Source: ISC2 Think Tank Title: From Impersonation to MFA Bypass: Tackling Today’s Most Sophisticated, Novel Phishing Threats Feedly Summary: As phishing attacks grow more advanced, even major tech companies have suffered losses exceeding $100 million from sophisticated email scams. With these threats evolving, messaging and collaboration tools are becoming particularly vulnerable, demanding…

  • Cloud Blog: Emerging Threats: Cybersecurity Forecast 2025

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/cybersecurity-forecast-2025/ Source: Cloud Blog Title: Emerging Threats: Cybersecurity Forecast 2025 Feedly Summary: Every November, we start sharing forward-looking insights on threats and other cybersecurity topics to help organizations and defenders prepare for the year ahead. The Cybersecurity Forecast 2025 report, available today, plays a big role in helping us accomplish this mission. This…

  • Cloud Blog: Emerging Threats: Cybersecurity Forecast 2025

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/emerging-threats-cybersecurity-forecast-2025/ Source: Cloud Blog Title: Emerging Threats: Cybersecurity Forecast 2025 Feedly Summary: Every November, we start sharing forward-looking insights on threats and other cybersecurity topics to help organizations and defenders prepare for the year ahead. The Cybersecurity Forecast 2025 report, available today, plays a big role in helping us accomplish this mission. This…

  • Docker: Accelerating AI Development with the Docker AI Catalog

    Source URL: https://www.docker.com/blog/accelerating-ai-development-with-the-docker-ai-catalog/ Source: Docker Title: Accelerating AI Development with the Docker AI Catalog Feedly Summary: Docker’s AI Catalog simplifies AI development by offering a curated platform that helps developers and publishers easily integrate AI capabilities into applications. AI Summary and Description: Yes **Summary:** The text discusses Docker’s introduction of the AI Catalog, a resource…

  • Anchore: 2024 Trends in Software Supply Chain Security

    Source URL: https://anchore.com/webinars/2024-trends-in-software-supply-chain-security/ Source: Anchore Title: 2024 Trends in Software Supply Chain Security Feedly Summary: The post 2024 Trends in Software Supply Chain Security appeared first on Anchore. AI Summary and Description: Yes Summary: The text discusses key insights from the 2024 Software Supply Chain Security Report, highlighting the increasing importance of software supply chain…

  • Cloud Blog: FEDRAMP High Development in the Cloud: Code with Cloud Workstations

    Source URL: https://cloud.google.com/blog/topics/public-sector/fedramp-high-development-in-the-cloud-code-with-cloud-workstations/ Source: Cloud Blog Title: FEDRAMP High Development in the Cloud: Code with Cloud Workstations Feedly Summary: In the demanding world of federal software development, teams are constantly challenged to deliver innovative solutions while upholding the highest security standards. The complexity of scaling teams, managing infrastructure, and ensuring consistent development environments can quickly…