cPacket: Every Packet Counts

Lars Trøen provides an insightful overview of cPacket’s technologies, emphasizing how critical each packet is in network monitoring and analysis. He demonstrated how cPacket’s solutions enable deeper visibility into network traffic, significantly aiding in performance tuning and security threat detection. For additional insights from Security Field Day 13, please visit his coverage on this topic.

Dell’s Comprehensive Approach to AI and the Dell AI Factory

Tom Hollingsworth recently explored Dell’s sophisticated approach toward harnessing the power of AI through the introduction of the Dell AI Factory, aimed at integrating advanced AI solutions into enterprise environments. This initiative combines Dell’s technological infrastructure with smart tools to enhance operational efficiency and innovation within organizations. You can read more about Tom’s insights from Security Field Day 13 on Security Boulevard, covering this topic in greater detail.

Veeam’s Quiet Evolution: From Backups to Detection, Response, and Recovery

Skye Fugate explores the strategic transformation of Veeam from its traditional focus on backups to a broader role encompassing detection, response, and recovery capabilities in enterprise security environments. This shift reflects Veeam’s response to the evolving needs of modern IT infrastructure, where security is paramount. For additional insights on Security Field Day 13 by Skye Fugate, visit his LinkedIn feed.

Microsoft Security Copilot Agents and You

Karen Lopez provides an insightful examination of Microsoft Security Copilot Agents, highlighting their role and impact on IT security protocols. She discusses the integration of these agents into existing security frameworks and their potential to enhance data protection and threat response efficiency. Further insights from Karen on Security Field Day 13 can be found here on LinkedIn.

Learning how Dell’s Hardware-assisted Security brings value to the organization

Lars Trøen explores the significant advantages that Dell’s Hardware-assisted Security offers to organizations, emphasizing how this technology enhances overall system protection and operational efficiency. He highlights the integration of cutting-edge security features into Dell’s hardware, illustrating their pivotal role in countering emerging cyber threats. For further insights and detailed analysis of Security Field Day 13, be sure to check out additional content by Lars Trøen.

Why Supply Chain Security Is The First Line of Defense

Tom Hollingsworth highlights the critical role of supply chain security as the foundational defense mechanism in protecting organizational systems and data. By analyzing how vulnerabilities within the supply chain can lead to widespread security breaches, he emphasizes the need for robust security strategies that address both direct and indirect threats. For additional insights from Security Field Day 13, refer to Tom Hollingsworth’s coverage on Security Boulevard.

Sign up for updates to
Tech Field day events

Thank you for being part of the Tech Field Day community! Our mailing list is a great way to stay up to date on our events and technical content, and we appreciate your signup.

We promise that we’ll never spam you, send ads, or sell your information. This list will only be used to communicate with our community about our events and content. And we’ll limit it to no more than one message per week.

Although we only need your email address, it would be nice if you provided a little more information to help us get to know you better!