Featured Videos
Why Network Security Must Be Your First Priority
The network is the central hub of your business—connecting people, devices, and data across multiple environments. Yet, every connection point is also a potential entry point for hackers.
Today, the network and threats have changed, and your thinking must change, too.
Watch| Read| ListenDigital Ghosts: The Cybersecurity Risks of Abandoned Data
Is your organization haunted by forgotten data?
Abandoned data can quickly become a prime target for cybercriminals lurking in the shadows, waiting to cause data breaches and compliance nightmares. Learn practical strategies to mitigate risk.
Watch| Read| ListenWhy Network Security Must Be Your First Priority
The network is the central hub of your business—connecting people, devices, and data across multiple environments. Yet, every connection point is also a potential entry point for hackers.
Today, the network and threats have changed, and your thinking must change, too.
Watch| Read| ListenDigital Ghosts: The Cybersecurity Risks of Abandoned Data
Is your organization haunted by forgotten data?
Abandoned data can quickly become a prime target for cybercriminals lurking in the shadows, waiting to cause data breaches and compliance nightmares. Learn practical strategies to mitigate risk.
Watch| Read| ListenThe Backup Fallacy: Why Data Protection Alone Won’t Stop Ransomware
Is data protection enough to stop ransomware in its tracks? Not quite.
Discover why air-gapped backups, immutability, and access controls are key to recovery—and how IT and security teams can join forces.
Watch| Read| ListenPrevent Cloud Costs from Crushing Your AI Initiatives
AI and High-Performance Computing (HPC) workloads are notorious for their demand on cloud resources.
Discover proactive measures to control cloud expenses while scaling your AI and big data capabilities.
Watch| Read| ListenHuman and AI Synergy in Modern Security — June 2024 TECH Talk
While cutting-edge AI technologies are becoming increasingly adept defending against cyber threats, the human factor remains indispensable.
Learn how to effectively combine human expertise and advanced technologies to fortify your cybersecurity posture.
Watch| Read| ListenScale Smart: Modern Storage for AI Workloads – May 2024 TECH Talk
Investing in scalable storage for AI workloads isn't just an operational decision—it's a strategic one.
Special guest Bjorn Kolbeck, CEO at Quobyte, shares practical insights to ensure the infrastructure that fuels your AI initiatives is set up for success.
Watch| Read| ListenBreach, Repeat: Understanding Recurrent Cyberattacks – April 2024 TECH Talk
When it comes to cybersecurity, the adage "lightning never strikes the same place twice" doesn’t apply.
The reality is 80% of ransomware victims get targeted again. Learn why and what you can do to protect your business.
Watch| Read| ListenMarch 2024 TECH Talk – Prepare to be Hacked: Strategic Cybersecurity Planning Session
Traditional security tools only spring into action after a breach, highlighting a critical gap in many organizations' defenses.
This oversight emphasizes the need for a dual approach, one that not only responds to incidents but also anticipates them.
Watch| Read| ListenEnsuring Network Resilience & Cybersecurity in a Digital Era—Feb. 2024 TECH Talk
In a world of distributed workers, data, and devices, networks are under extreme pressure. The need for robust network resilience and cybersecurity is critical.
Network expert Ross Rehart shares network trends, tips, and common pitfalls.
Watch| Read| ListenJan. 2024 TECH Talk – Cybersecurity in the Fast Lane
A year ago, generative AI caught most businesses by surprise. We provide a heads up on the cybersecurity trends you can expect in 2024.
Topics include the convergence of IT and security, zero trust, social engineering, and a quantum cryptography primer.
Watch| Read| Listen2023 Cybersecurity Highlights – TECH Talk Year in Review
In 2023, organizations worldwide faced increasing sophistication of cyber-attacks…With generative AI as a powerful catalyst, the story of the year is not just change, but the acceleration of change.
In this compilation video, we feature key year-end takeaways to strengthen your security posture.
Watch| Read| ListenNov. 2023 TECH Talk – Users Can’t Be Your First Line of Defense
93% of attacks come through email, and it only takes 1-click to create a ransomware situation. Inevitably, things are going to get through—which is why organizations can’t rely on their employees as a first line of defense.
Getting breached isn't a matter of if, it's when. Employees should receive recurring training because testing isn't enough.
Watch| Read| ListenOctober 2023 TECH Talk – Data Exposure from Open Directory Listings
Open directories make a hacker’s job easy; and, according to recent Censys research, millions of files with potentially sensitive data have been exposed by internet-connected devices and servers with open directory listings.
How do you know if your company data is exposed? We share proactive steps you should take right away.
Watch| Read| ListenSeptember 2023 TECH Talk – MGM Breach: Preparing for the Inevitable
The MGM breach serves as a wake-up call for all organizations. If they can be breached, anyone can be breached.
We’re in the era of accelerated threats and significant consequences. Let's dive in to how companies can prepare proactively and defensively for what’s coming at them.
Watch| Read| ListenAugust 2023 TECH Talk – Small Steps, Big Protection
Many institutions and businesses assume they're too small to be targeted, and cybercriminals take advantage of this mindset. Every-sized organization needs to protect their confidential data.
Don't wait for a breach to force your hand – learn how to craft your cybersecurity strategy in manageable, incremental steps, and proactively safeguard your company's sensitive data, systems, and reputation.
Watch| Read| ListenJuly 2023 TECH Talk – Unintentional Insider Threat: Is ChatGPT a Friend or Foe?
We address the critical concern of unintentional business threats arising from employees putting sensitive company information into ChatGPT's Large Language Model (LLM).
While ChatGPT can be a valuable tool for various tasks, the potential risks of exposing confidential data, data breaches, and compromised security cannot be ignored.
Watch| Read| ListenJune 2023 TECH Talk – Why Email Security is Falling Behind
93% of cyberattacks start with email. It’s an “old school” attack vector—and one that simply can't keep up to secure against the volume and sophistication of attacks coming at it. This includes a tidal rise in business email compromise (BEC)—with pretexting attacks alone doubling in just a year. Adversaries use well-orchestrated social engineering techniques and impersonate a known and trusted figure, preying on peoples’ kind nature. Bad actors monitor social media posts looking for the perfect opportunity to strike (traveling CEOs, new hires, etc).
Watch| Read| ListenMay 2023 TECH Talk – Why Layered Defense is Critical for Effective Cybersecurity
“Layered security" is just the starting point in today’s rapidly evolving threat landscape. A layered defense strategy extends beyond the basics. It’s about deploying multiple, specialized tools at each security layer—to provide a response tactic tuned for each type of attack.
Watch| Read| ListenApril 2023 TECH Talk – The Security Implications of ChatGPT
The meteoric rise of ChatGPT has taken the world by surprise—and there’s no putting the genie back in the bottle. In this 30-min talk, we’ll take a beat to look at the cybersecurity implications.
Like all powerful tools, ChatGPT can be used for good and for ill. While we expect a future wave of advancements that will help strengthen security, right now, cyber-adversaries are leveraging ChatGPT and other generative AI to do harm.
Watch| Read| ListenMarch 2023 TECH talk – Why Endpoint Security Isn’t Nearly Enough
Endpoint security isn’t nearly enough. The growing threat of increasingly sophisticated cyberattacks requires a security strategy that delivers more visibility into every application and user on the network.
Organizations who adhere to solely an endpoint-focused security posture are extremely vulnerable. Why? They miss the ticking clock: DWELL TIME.
On average, dwell time is over 6 months. That’s a lot of time for a cyberattacker to have free reign in an environment!
Watch| Read| ListenFebruary 2023 TECH talk – Interpreting the Global Cyber Outlook for 2023
One of the storylines coming out of the recent World Economic Forum was the Global Cyber Outlook for 2023. Of note: 86% of business leaders believe there will be a catastrophic cyber-attack in the next 2 years and 43% feel it will have a material impact on their business. Billionaire Warren Buffett was quoted as saying cyber-attacks were a bigger threat to humanity than nuclear weapons.
Scary and somewhat nebulous. DataEndure’s February TECH talk will move beyond the headlines, dive further into this report, and discuss some important takeaways that are relevant and actionable to prepare and secure any organization for whatever lies ahead.
Watch| Read| ListenJanuary 2023 TECH talk – Top 3 Security Priorities for 2023
We’ve put our list together and have checked it twice–and during January’s TECH talk, we will be sharing DataEndure’s Top 3 Security Priorities for 2023. With an eye on technology trends and ears tuned into customer challenges and requirements, we’ll share the top areas to consider this year as you evaluate the health and maturity of your organization’s security posture.
Watch| Read| ListenDecember 2022 TECH talk – Year of the Endpoint
As we reflect on 2022, it could be designated as "the year of the endpoint." With the jury still out on remote or hybrid work environments, one thing is for certain: data on the endpoint is at risk like never before. Join DataEndure’s December TECH talk as we share significant errors organizations make with security tools, and examine if endpoint security tools and firewalls are enough. We’ll arm you with valuable insight to take into the New Year to help evaluate your security investments.
Watch| Read| ListenNovember 2022 TECH talk – Tis the Season … MSPs Looking to Up their (Customers’) Security Game
Everyone is struggling to keep up with security threats and bad actors – including the MSP community. Operations are getting more complicated, devices they are being asked to manage are more diverse than ever and growing exponentially, and many MSPs still function in a break-fix or reactive mode.
With the critical and trusted role MSPs hold in their customer communities, it is imperative for them to integrate a sophisticated security approach into their IT stack. Join us as we reveal the creative ways MSPs are solving for this, solidifying not only their security posture but that of their customer base.
Watch| Read| ListenOctober 2022 TECH Talk – Leveling Up – from Awareness to Preparedness
October is Cybersecurity Awareness Month, and while we would argue awareness should be 365 days out of the year, it does provide an opportunity to put a spotlight on the ongoing risks and challenges posed by cyberadversaries. With our employees on the front line of this battle, it is key that organizations effectively engage and equip them.
We discuss how to get the most out of your Cybersecurity Awareness efforts - not just in October (or one-time) – but year-round. You’ll get insights into what an effective strategy includes, how to accelerate your program and ensure constant visibility and inspection.
Watch| Read| ListenSeptember 2022 TECH talk – The Cyber-insurance Landscape is Changing – Are you still Insurable?
Cyberattacks continue to rise and many organizations — including those with mature cybersecurity programs — are looking to reduce their financial risk through cyber insurance. With the costs of cyberattacks nearly doubling between 2016 and 2019, U.S. insurance entities have responded by becoming more selective about who and what gets covered.
Consequently, many insurance companies are expanding their minimum cybersecurity baseline requirements beyond general “best practices” to a higher level of maturity seen historically in only regulated industries.
Watch| ListenOctober 2021 TECH Talk – 3 Ways Cybersecurity is like Halloween
Whether it’s Halloween or cybersecurity, what looks like a treat can really be a trick. Organizations like yours need to stay vigilant with multiples layers of defense against those in disguise poking around your network looking to steal your data.
Leaving all your lights off on Halloween may signal that you’re all out of candy, but it can also make you an easy target to vandals. Join us for our October TECH talk where we’ll look at a cyberdefense strategy that announces “we are home” and keeps the villains away all year long.
Watch| ReadSeptember 2021 TECH Talk – Making ZTN Work for your Organization
We had a strong response to our last TECH talk, with a lot of people voicing their frustrations with Zero Trust. Among them, “ZTN doesn’t work” and “It’s too hard to deploy everywhere”.
Join DataEndure this month, where we discuss how a change of perspective can make all the difference and help make Zero Trust work for your organization.
August 2021 TECH Talk – “Zeroing in” on zero trust
Join DataEndure as we “zero in” on zero trust, what is, what it’s not – and how, for some, the reality of securing your enterprise perimeter composed of cloud and remote work locations might be closer than you think.
Watch| ReadProtect and Secure Your Data in Times of Increasing Threat
Ransomware attacks targeting enterprise data continue to increase to our of control levels. Attackers are becoming more sophisticated, zeroing in on your backup infrastructure. Cohesity is the only modern backup solution to offer a comprehensive solution against ransomware attacks. It uniquely offers a multi-layer approach to make sure you bounce back rapidly.
Put Time Back on Your Side: Identify Threats Faster with VirusTotal Enterprise
VirusTotal Enterprise (VTE) houses and presents the information your security team needs to identify threats faster and more efficiently. You will discover the capabilities and best practices of using VTE to search more data, faster, and to visualize it in new ways.
April 2020 TECH Talk
Join DataEndure and Actifio as we discuss the implications this new normal has put on data accessibility and protection; and why initiatives that may have been nice to haves are all of a sudden fast-tracking in priority to help enable business continuity and progress during disruptive times.
WatchSeptember 2019 DataEndure TECH talk
How does California’s most innovative HVAC contractor not only survive but thrive for over 50 years? With the firm employing more than 1000 people across three regional offices, their priority is to deliver innovative mechanical solutions to clients, on time and on budget. Yet with all of the technology changes and market pressure, how do they balance the urgency to innovate with the complexities of managing and securing its vital information assets?
Watch| Read