How To Get Your Employer Branding Right
The best talent has plenty of options, so differentiating your organization is critical. The time to start thinking about positioning your company as a great employer is long before you ever post a job or interview a candidate.
In this pre-recorded, 45 minute webinar, we were joined by Maria Rodriguez, Global HR Director of HireRight, where we discussed:
- How companies can maintain a strong employer brand during times of crisis and the story they should be telling
- How recruiters and hiring managers who don’t have buy-in from management can get support for employer branding initiatives
- How can hiring professionals ensure their employer branding is both authentic and compelling
- The best ways to measure the success of employer branding campaigns
Learn how you can shape your employer brand so that it is both authentic and compelling to candidates and employees.

OSS Supply Chain Security and How to Help Your Overburdened Dev Team
In this Upstream chat, Tracy Bannon from MITRE joined us to discuss why it took so long, what is happening now that will help organizations positively impact their own security preparedness, and how we can bring forward good ideas and warnings in the future.
She discussed how to talk about risk profile and ways organizations can force-rank priorities. She also discussed why it’s important to reduce cognitive load on the development teams and why it’s important to offload some tasks onto trusted vendors.
Tidelift CEO and co-founder Donald Fischer then joined the discussion and explained how all this applies to open source software specifically. Donald and Tracy discussed the recently disclosed security vulnerability in the Apache log4j project, which has been dubbed “Log4Shell”, why it’s important to address quickly, how to address it, and how to better prepare for future vulnerabilities. You won't want to miss this.

Everything You Need to Know About the Log4Shell Vulnerability
Log4j is a popular library for logging things in Java applications. Practically every organization that uses Java (Maven/Gradle) uses Log4j and has likely been impacted by the log4shell vulnerability.
In this 20-minute briefing, Tidelift solutions architect lead Mark Galpin shares what you need to know about the recent Log4Shell vulnerability—and demos how Tidelift can help.
Mark breaks down the current situation and shares tips for remediating the issue. You won't want to miss this.

Galileo Cloud Compass
Don't Overpay for Cloud!
KNOW BEFORE YOU GO
Galileo’s Cloud Compass will help you evaluate your servers and connected storage and compare it to the current pricing data from Azure, AWS, & IBM so you can make an intelligent cloud decision in minutes.
Cloud Compass can provide fast insight into thousands of systems and easily spot waste. (Yes, even AIX & IBM i) It consistently helps businesses of all sizes realize drastic savings on their monthly cloud bills. In this demo, you’ll see how GCC helped one customer cut $50,000 a MONTH off their cloud bill! So what kind of savings will it uncover for you? Watch the demo to find out.
INSIDE THE DEMO:
| RIGHT-SIZING Intelligently size your cloud environment based on peak workloads from your existing architecture. |
PRICE ANY CLOUD Upload user-defined pricing to show cost information for ANY cloud, including your on-prem infrastructure! |
| COMPARE YOUR SAVINGS See multiple cloud options |
ANALYZE EVERYTHING Perform in-depth cost analysis with enhanced tables that allow you to pivot, group, filter, and more. |

DevOps: Taking Your Infrastructure to the Next Level
High-performing DevOps teams state a 106x faster lead time, and a 7x lower change failure rate, than their lower-performing peers in a 2019 DORA/Google Cloud survey.
Already sold on DevOps? How well is your DevOps organization performing? What's your next step?
Join discussion on how simulation can help you level up your DevOps practices.
What you will learn:
- How to remove bottlenecks caused by lack of hardware availability
- Why (and how) choosing accuracy vs. speed may help you go faster
- How nondestructive testing can save you money
- How to test on 1 or 100 devices without doing 100x the work

Deploying Containers in a RTOS World
Embedded development is modernizing and transforming digitally, changing forever — and for good. The Internet of Things and the advent of intelligent systems require network connectivity to collect data that can be used for monitoring and analytics. This persistent connectivity calls for constant upgrades and new capabilities as well as rapid fixes for security issues. One of the most efficient and effective ways to accomplish this is through containers.
This demonstration and discussion will touch on some of the embedded use cases where it makes sense to leverage container technology on an RTOS. We will show you how containers can empower a software developer to leverage open source, extend functionality after deployment, and adapt to changing specifications.
What you will learn:
- Use cases for containers on both Linux and VxWorks
- How to resource partitioning to maximize container benefits
- How to rapidly deploy a new application for VxWorks using containers

10 Best Practices for Secure Embedded Systems
Learn the latest threats to your embedded systems and how to protect against them — even when attackers have already struck.
The number of security flaws published last year made 2020 the fourth consecutive year to break records in the number of recorded vulnerabilities (US-CERT Vulnerability Database). We must change how we think about securing embedded systems.
Join Wind River® for a discussion of the current threat landscape and a look at 10 principles that can achieve a multiplicative effect in helping your organization protect embedded systems.
You will learn:
- The modern threat landscape for embedded systems
- Why it’s impossible to always keep all attackers out
- How to protect a system that an attacker has already breached
- 10 fundamental and essential properties of secure embedded systems

Thinking Upstream About White House Cybersecurity Order 14028
A few months ago, the U.S. White House released cybersecurity executive order 14028, an attempt by the United States government to use its purchasing power to create positive changes to the way cybersecurity is addressed around the world.
Recent high profile breaches like the Colonial Pipeline ransomware attack or the SolarWinds software supply chain attack have shown that our cybersecurity defenses are woefully inadequate. This executive order forces a higher standard of cybersecurity for any organization selling software to the federal government, which in turn makes it the de facto global standard for all software in the future.
Tidelift CEO and co-founder Donald Fischer shares his perspective on how the cybersecurity executive order impacts software supply chain security. He’ll brief attendees on the key issues addressed by the executive order, including software bill of materials (SBOM), supply chain security, and provenance requirements. He’ll outline the gaps that most organizations will need to close in order to stay in compliance. And he’ll share a proactive approach to addressing open source software supply chain health and security upstream.
If you want to ensure your organization is fully prepared for the coming changes, you won’t want to miss this briefing.

Thinking upstream about White House cybersecurity order 14028
A few months ago, the U.S. White House released cybersecurity executive order 14028, an attempt by the United States government to use its purchasing power to create positive changes to the way cybersecurity is addressed around the world.
Recent high profile breaches like the Colonial Pipeline ransomware attack or the SolarWinds software supply chain attack have shown that our cybersecurity defenses are woefully inadequate. This executive order forces a higher standard of cybersecurity for any organization selling software to the federal government, which in turn makes it the de facto global standard for all software in the future.
Tidelift CEO and co-founder Donald Fischer shares his perspective on how the cybersecurity executive order impacts software supply chain security. He’ll brief attendees on the key issues addressed by the executive order, including software bill of materials (SBOM), supply chain security, and provenance requirements. He’ll outline the gaps that most organizations will need to close in order to stay in compliance. And he’ll share a proactive approach to addressing open source software supply chain health and security upstream.
If you want to ensure your organization is fully prepared for the coming changes, you won’t want to miss this briefing.

Adding Anomaly Detection to Your Secure Access Strategy
Security analytics are a double-edged sword: while the information they provide can be vital to identify potential issues or anomalies before they become problems, the quantity of data collected and alerts generated can overwhelm even the most experienced security team. By processing all of the telemetry collected during an access attempt and setting a baseline, Duo understands whether a login is normal or deviates from established patterns. This helps administrators efficiently focus on the most likely risks and remediate them. How can we best filter the noise of routine authentications and highlight anomalous logins that may require attention? Join Cisco’s Ted Kietzman to explore anomaly detection and secure access.
Adding Anomaly Detection to Your Secure Access Strategy
Security analytics are a double-edged sword: while the information they provide can be vital to identify potential issues or anomalies before they become problems, the quantity of data collected and alerts generated can overwhelm even the most experienced security team. By processing all of the telemetry collected during an access attempt and setting a baseline, Duo understands whether a login is normal or deviates from established patterns. This helps administrators efficiently focus on the most likely risks and remediate them. How can we best filter the noise of routine authentications and highlight anomalous logins that may require attention? Join Cisco’s Ted Kietzman to explore anomaly detection and secure access.
Maximize your Microsoft 365 Investment With Collaborative Tools From Adobe
With flexible workstyles now the norm, use of Microsoft Teams and Microsoft 365 are at an all-time high. From e-signatures to document collaboration and creative tools, Adobe’s most powerful capabilities integrate natively into Teams to drive greater productivity and enhanced business growth.
In the on-demand webinar Adobe helps you get more done in Microsoft Teams, Microsoft and Adobe partner to explore maximizing your investment in Microsoft 365 by taking advantage of the full suite of Adobe productivity capabilities. Watch the webinar to see how to:
- Collaborate on PDF documents with Adobe Acrobat
- Add e-signatures to face-to-face meetings with Live Sign
- Bring security and tracking to Teams Approvals with Adobe Sign
- Access Adobe Creative Cloud files and collaborate on projects
All within Microsoft Teams.
[Speakers:]
- Mike Ammerlaan, Director Microsoft 365 Ecosystem Marketing, Microsoft
- Garrett Schwartz, Product Marketing Manager, Adobe
- Ben Vanderberg, Sr. Tech Product Evangelist, Adobe

3 Steps to Reduce Risk in Your Cloud Environment(s)
Ensure Security in the Cloud
As the cloud becomes foggier and even edge environments begin to resemble traditional cloud, it becomes increasingly difficult to maintain a posture that reduces an organization's risk. With technology strewn across disparate environments, the attack surface area for your network expands rather dramatically.
How confident are you that your security strategy is doing that - without sacrificing agility?
Watch, 3 Steps to Reduce Risk in Your Cloud Environment(s), to learn how to:
- Improve your overall security posture
- Eliminate misconfigurations that can increase your attack surface
- Articulate your risk reduction strategy to senior management

Light in the Dark: Hunting for SUNBURST
This past winter, FireEye uncovered a widespread campaign conducted by a threat group we labeled UNC2452. This group used SolarWinds’ Orion Platform to launch a supply chain attack and deploy a backdoor called SUNBURST that affected organizations around the globe.
Mandiant Managed Defense was hunting down the threat and identifying potential victims before the attack had a name.
In this on-demand webinar, Mandiant’s Matt Bromiley and Andrew Rector share an inside look at how Mandiant addressed the SUNBURST threat with clients. You’ll hear frontline stories, and:
- See how this attack influences the way we view cyber security
- Learn SUNBURST threat actors TTPs
- Discover the techniques used by Mandiant threat hunters

Hear from experts on how to address key challenges in equipment rentals
Offering consumers the exceptional customer service they want and sustaining efficient maintenance, logistics, and other operations are critical for successful equipment rental organizations. Maximizing your utilization of equipment investments while identifying and trimming costs throughout customer and equipment lifecycles are unrelenting business factors in ongoing operations for equipment rental businesses.
In the webinar How to Address Key Rental Challenges, Microsoft and To-Increase partner to share the real-world story of EQIN, a leading equipment rental company that realized new value by digitally transforming their business with To-Increase’s DynaRent Solutions Suite for Microsoft Dynamics 365 for Finance and Operations. Watch the webinar on-demand now by clicking the link below, and see industry experts discuss:
- Automating rental processes to reduce end-to-end costs and measure TCO
- Improving utilization of rental equipment
- Streamlining rental operations to maximize profitability and stay ahead of competitors </ul Speakers:
- Kevin Davis, Sales Specialist, To-Increase
- Martin Luttik, Project Manager, EQIN
- Ben in’t Veld, Application Architect, EQIN </ul
