Defending the Castle: Back to the Future using Isolated Networks

Air-gapped and isolated networks shine in certain cyber defense situations where very high levels of protection are required.  Their main advantage is that they greatly reduce the attack surface and even make many attack types unfeasible. This webinar discusses air-gapped and isolated networks, their strengths and weaknesses, and covers one of the most critical defense measures that is required in isolated networks, the media security station or kiosk and discusses best practices in employing "kiosks" as a critical part of an isolated network defense strategy.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Unified Cloud Infrastructure Management with 5nine

5nine

By 2020, the cloud-enabling technology market will approach $40 billion. Meanwhile, 60% of all workloads will be deployed to the cloud, compared to only 45% in 2018. What will be your organization's primary approach to hybrid cloud? Join 5nine's Chief Product Officer, Vince Arneja and learn why Microsoft Cloud plays a mission-critical role in today's business and how the right unified management and security solution can assist in building a robust unified cloud management strategy: Centralize control of large, multitenant hybrid cloud environments.
Watch Now

How to Successfully Deploy & Test a 5G NR Network

Telecoms

5G is becoming more and more of a reality, with numerous trials and proofs of concept occurring throughout the world. Some mobile operators have even announced their first commercial launches.However, several aspects of a 5G New Radio (NR) deployment present a significant departure from previous mobile technologies: for example, the use of new frequency bands including 3.5GHz and mmWave spectrum, larger carrier bandwidths up to 100MHz, active antennas capable of supporting massive MIMO operations, and beam management functions like beam forming and beam steering. Additionally, more traditional requirements like band clearing or interference analysis all may require a comprehensive amount of testing and validation, particularly in real-life conditions and to assure the optimal performance of this new type of radio signal.
Watch Now

Practical Human-in-the-Loop Machine Learning

Awscloud

Join us to learn why Human-in-the-Loop training data should be powering your machine learning (ML) projects and how to make it happen. If you’re curious about what human-in-the-loop machine learning actually looks like, join Figure Eight CTO Robert Munro and AWS machine learning experts to learn how to effectively incorporate active learning and human-in-the-loop practices in your ML projects to achieve better results.
Watch Now

API Management in Service Mesh Using Istio and WSO2 API Manager

wso2

In a world of disaggregated API-based architectures, developers are increasingly adopting microservices and Service Mesh is being used to control many service-to-service communications. But securely communicating and governing between such services is becoming a key challenge.
Watch Now