MYSEC.TV

Home   /   RESOURCES   /   MYSEC.TV   / MySec.TV Live – Optical Networks by Infinera & IBM Security’s X-Force Threat Index

MySec.TV Live – Optical Networks by Infinera & IBM Security’s X-Force Threat Index

Tech & Sec Weekly
SHARE:

IN THIS VIDEO

In this episode we first look at Infinera’s 800G per wavelength GX Series Compact Modular Platform which is to be deployed in Malaysia.

From the US, we speak with Mr. Rob Shore, Senior Vice President of Infinera’s Global Marketing. Rob has more than 25 years of experience in the telecommunications industry leading marketing efforts, providing networking consultation and solutions and directly supporting customers in more than 65 countries across the world. He has held roles in engineering, system testing, technical support, market management, account management, technical sales and marketing. Mr. Shore graduated from the University of Illinois with a bachelor’s in Computer Engineering.

Then we cross to Hong Kong and speak with Matthew Glitzer, Vice President, Asia Pacific for IBM Security. We’re going to walk through the recently released X-Force Threat Intelligence Index – with 25% of all attacks observed in the APAC region.

#mysecurityTV

OTHER VIDEOS IN THIS SERIES

Astronomers
April 18, 2024
An international team of astronomers has discovered 49 new gas-rich galaxies using the MeerKAT radio telescope in South Africa. Watch Now
apsm_03
April 8, 2024
What are the strategic directions for AI in homeland security. Attending Milipol APAC and TechX Summit 2024, we speak with Physicist and former Yale University Professor, Dimitri Kusnezov, Under Secretary for S&T, US Department of Homeland Security. Watch Now
apsm_01
April 8, 2024
With the rapidly evolving challenges in global travel, trade, and security, we speak to Australian Border Force Commissioner, Michael Outram APM at the Milipol APAC and TechX Summit 2024 in Singapore. Watch Now
apsm
April 2, 2024
Pentera is an automated pentesting platform. Validate every attack surface in your network, and test continuously to maintain control over your true security posture. Be proactive in fixing vulnerabilities, misconfigurations, leaked credentials, and privileges before they are exploited. Watch Now