How Does Resolution Intelligence Cloud Work in a Cybersecurity Mesh Architecture?
John Pirc, VP and Head of Product Management, Netenrich, explains how the Resolution Intelligence Cloud works in a Cybersecurity Mesh Architecture...
John Pirc, VP and Head of Product Management, Netenrich, explains how the Resolution Intelligence Cloud works in a Cybersecurity Mesh Architecture...
Netenrich's John Pirc, VP and Head of Product Management, highlights the six major security issues addressed by Resolution Intelligence Cloud. He...
Jonas Kelley, Google Cloud's Head of MSSP Partnerships, shares his thoughts on the importance of context and data in security.
Jonas Kelley, Head of MSSP Partnerships, Google Cloud, answers John Pirc, VP of Product Marketing at Netenrich, about the top threats organizations...
The Head of Product Marketing at Google Chronicle, Sharat Ganesh, offers his forecasts for the most important security concerns in the year 2023.
Sharat Ganesh, Product Marketing Head at Google Chronicle, highlights the significance of bridging the IT-security operations gap. He underlines the...
Simon Aldama, a Netenrich Advisor, demonstrates Resolution Intelligence's Cyber Situational Awareness modules in this demo.
Netenrich's Resolution Intelligence streamlines incident management to avoid future disruptions and provides cyber resilience for digital operations.
Continuing to buy more tools and hire more people does not necessarily lead to better security. While it may improve security postures in the...
John Bambenek, Principal Threat Hunter, explains how low-detection phishing kits are being utilized to circumvent multifactor authentication (MFA).
The pandemic rapidly accelerated digital transformation for organizations around the world. Now that the pandemic is behind us, new risks and new...
John Pirc, VP of Product Management at Netenrich, details the current challenges in defending today’s attack surface and the core tenants of CSMA.
John Bambenek, Principal Threat Hunter, explains how FontOnLake targets Linux systems and gives attackers remote access to infected devices.