Sevan Woods & Shakita DennisChainApr 27CyberTalks Episode 3 - Threat ModelingWelcome to our latest CyberTalks' episode. Today, Marshal Savage, a Distinguished Dell Engineer, will be joining us today to discuss...
Sevan WoodsApr 25Data Privacy? Data Protection? What’s the difference? I’m sure you have heard or used the terms data privacy and data protection. The two terms data privacy and data...
Sevan WoodsMar 28CyberTalks Episode 2 - What is Secure Component Verification (SCV)?Welcome to CyberTalks’ second podcast episode! Today, Adam Cook will be joining us to discuss Secure Component Verification (SCV). We’re...
Sevan WoodsMar 15Danger: Ransomware AttacksIf you have read some of my blogs before, you probably remember me talking about ransomware. If you haven’t, check out Data Protection...
Sevan Woods & Shakita DennisChainFeb 24Welcome to CyberTalksWelcome to the CyberTalks Podcast! Your host, Sevan Woods, and Co-Host ,Shakita DennisChain, wanted to take a minute to introduce...
Sevan WoodsDec 8, 2021Data Protection Security PT. 3 – Cyber AttacksOh, great your back! Let’s continue with our data protection security series by talking about different types of cyber-attacks. What is a...
Sevan WoodsNov 22, 2021Data Protection Security PT. 2 Welcome back! Today we’ll continue with our Data Protection Security series by talking more in-depth about the different ways to protect...
Lance StedmanOct 1, 2021PowerFlex FTW Tales From the Field - The Service Catalog Tales From the Field – September ‘21 Imagine working in an environment so incredibly complex that service providers won’t even talk to...
Sevan WoodsSep 21, 2021Data Protection SecurityI’ve been asked numerous times, “What is data protection?”, so I decided to take you through an adventure of data protection. Hello, I’m...