﻿<?xml version="1.0" encoding="utf-8"?><rss version="2.0"><channel><title>news.lt Media News</title><link>http://www.news.lt/?Lang=LT</link><lastBuildDate>2026-05-06 05:14:45</lastBuildDate><copyright>Copyright (c) 2011 5CI, UAB</copyright><image><url>http://www.news.lt/images/penki-logo.png</url><title>news.lt</title><link>http://www.news.lt/?Lang=LT</link><description /><width>87</width><height>90</height></image><language>LT</language><item><title>The next generation of security</title><link>http://www.news.ltThe-next-generation-of-security.video?id=261310</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=261310&amp;filetype=1" alt="" /&gt;The next generation of security, Razvan Cobzaru, Bitdefender</description><pubDate>2015-06-11T11:00:00.0000000</pubDate></item><item><title>Simplicity redefined for EMM</title><link>http://www.news.ltSimplicity-redefined-for-EMM.video?id=261301</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=261301&amp;filetype=1" alt="" /&gt;Simplicity redefined for EMM, Per Soderqist, Sophos</description><pubDate>2015-06-10T17:00:00.0000000</pubDate></item><item><title>Smart Home Hacking</title><link>http://www.news.ltSmart-Home-Hacking.video?id=261300</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=261300&amp;filetype=1" alt="" /&gt;Smart Home Hacking, Daniel Schwarz, SEO Consult</description><pubDate>2015-06-10T16:00:00.0000000</pubDate></item><item><title>Demo of Endpoint Select &amp; MDM</title><link>http://www.news.ltDemo-of-Endpoint-Select-MDM.video?id=261299</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=261299&amp;filetype=1" alt="" /&gt;Demo of Endpoint Select &amp; MDM, Pavel Glavinskij, Kaspersky</description><pubDate>2015-06-10T16:00:00.0000000</pubDate></item><item><title>If you knew you were going to be compromised - would you do security differently</title><link>http://www.news.ltIf-you-knew-you-were-going-to-be-comprom.video?id=260896</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=260896&amp;filetype=1" alt="" /&gt;If you knew you were going to be compromised - would you do security differently, Juha Launonen. Cisco</description><pubDate>2015-06-03T08:00:00.0000000</pubDate></item><item><title>Current Threat Landscape</title><link>http://www.news.ltCurrent-Threat-Landscape.video?id=260891</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=260891&amp;filetype=1" alt="" /&gt;Current Threat Landscape, Dirk Kollberg. Kaspersky</description><pubDate>2015-06-03T08:00:00.0000000</pubDate></item><item><title>Cyber threats and responses in a global economy. Does location matter?</title><link>http://www.news.ltCyber-threats-and-responses-in-a-global.video?id=260890</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=260890&amp;filetype=1" alt="" /&gt;Cyber threats and responses in a global economy. Does location matter? Joerg Weber. Barclays</description><pubDate>2015-06-03T08:00:00.0000000</pubDate></item><item><title>Data Theft Prevension - own your asset before your adversary</title><link>http://www.news.ltData-Theft-Prevension---own-your-asset-b.video?id=260888</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=260888&amp;filetype=1" alt="" /&gt;Data Theft Prevension - own your asset before your adversary. Neil Thacker. Websence, ENISA.</description><pubDate>2015-06-03T08:00:00.0000000</pubDate></item><item><title>Rimtautas Černiauskas. Nacionalinio kibernetinio saugumo centras</title><link>http://www.news.ltRimtautas-Cerniauskas-Nacionalinio-kiber.video?id=260902</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=260902&amp;filetype=1" alt="" /&gt;Rimtautas Černiauskas. Nacionalinio kibernetinio saugumo centras</description><pubDate>2015-06-02T08:00:00.0000000</pubDate></item><item><title>Sophos UTM</title><link>http://www.news.ltSophos-UTM.video?id=260901</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=260901&amp;filetype=1" alt="" /&gt;Sophos UTM, Per Soderqvist, Sophos</description><pubDate>2015-06-02T08:00:00.0000000</pubDate></item><item><title>Challenges in securing virtualized environments</title><link>http://www.news.ltChallenges-in-securing-virtualized-envir.video?id=260900</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=260900&amp;filetype=1" alt="" /&gt;Challenges in securing virtualized environments, Iulian Hars, Kaspersky Lab</description><pubDate>2015-06-02T08:00:00.0000000</pubDate></item><item><title>Continuous Threat - Continuous Protection: Can you protect, what you can't see?</title><link>http://www.news.ltContinuous-Threat---Continuous-Protectio.video?id=260898</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=260898&amp;filetype=1" alt="" /&gt;Continuous Threat - Continuous Protection: Can you protect, what you can't see? Juha Launonen, Cisco</description><pubDate>2015-06-02T08:00:00.0000000</pubDate></item><item><title>Securing Our Online Future</title><link>http://www.news.ltSecuring-Our-Online-Future.video?id=260897</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=260897&amp;filetype=1" alt="" /&gt;Securing Our Online Future, Mikko H. Hypponen</description><pubDate>2015-06-02T08:00:00.0000000</pubDate></item><item><title>Cisco FirePOWER threat protection in action</title><link>http://www.news.ltCisco-FirePOWER-threat-protection-in-act.video?id=261316</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=261316&amp;filetype=1" alt="" /&gt;Cisco FirePOWER threat protection in action, Redžinalds Kripšiis, Cisco</description><pubDate>2015-06-11T12:02:31.2470000</pubDate></item><item><title>Qualys Platform - Continuous security for continuous threats</title><link>http://www.news.ltQualys-Platform---Continuous-security-fo.video?id=260919</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=260919&amp;filetype=1" alt="" /&gt;Qualys Platform - Continuous security for continuous threats, Marek Skalicky, Qualys</description><pubDate>2015-06-04T11:48:10.3300000</pubDate></item><item><title>How well prepared are you for the next security threat?</title><link>http://www.news.ltHow-well-prepared-are-you-for-the-next-s.video?id=260918</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=260918&amp;filetype=1" alt="" /&gt;How well prepared are you for the next security threat? Florian Malecki, Dell SonicWALL</description><pubDate>2015-06-04T11:38:06.0970000</pubDate></item><item><title>From the „I love you Virus“ to the present</title><link>http://www.news.ltFrom-the-I-love-you-Virus-to-the-present.video?id=260916</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=260916&amp;filetype=1" alt="" /&gt;From the „I love you Virus“ to the present, Wolfgang Wimmer, GFI Software</description><pubDate>2015-06-04T10:35:05.4670000</pubDate></item><item><title>WW3 has started. Do we have any way to protect ourselves?</title><link>http://www.news.ltWW3-has-started-Do-we-have-any-way-to-pr.video?id=260914</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=260914&amp;filetype=1" alt="" /&gt;WW3 has started. Do we have any way to protect ourselves? Michael Soukonnik, Radware</description><pubDate>2015-06-04T10:10:50.5800000</pubDate></item><item><title>Prevention First - Introducing the Enterprise Security Platform</title><link>http://www.news.ltPrevention-First---Introducing-the-Enter.video?id=260907</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=260907&amp;filetype=1" alt="" /&gt;Prevention First - Introducing the Enterprise Security Platform, Sami Walle, Palo Alto Networks</description><pubDate>2015-06-03T16:39:20.0800000</pubDate></item><item><title>Thera are only two places in this league of Cyber threats, first place and no place</title><link>http://www.news.ltThera-are-only-two-places-in-this-league.video?id=260905</link><description>&lt;img align="left" vspace="5" src="http://media.search.lt/GetFile.php?OID=260905&amp;filetype=1" alt="" /&gt;Thera are only two places in this league of Cyber threats, first place and no place, I. Whiteside &amp; K. Vatnestrom, F-Secure</description><pubDate>2015-06-03T16:16:21.0970000</pubDate></item></channel></rss>