Get the latest
Stay up to date with the latest cybersecurity trends, best practices, security vulnerabilities, and so much more.
Zero spam. Unsubscribe at any time.
The latest cybersecurity trends, best practices,
security vulnerabilities, and more
James is an experienced cyber security and IT professional with over 16 years expertise spanning cyber security, infrastructure and service delivery. Alongside solutioning Trellix’s broad suite of capabilities, James specialises in threat intelligence, working with the Trellix Threat Intelligence Group (TIG) to help customers mature their intelligence programs. Prior to Trellix, James worked at Digital Shadows and RSA Security, with extensive experience across public and private sectors.
Zero spam. Unsubscribe at any time.
Be concise and specific:
Wrong: I want to learn how to migrate to Trellix Endpoint Security
Right: Trellix Endpoint Security migration
Use quotation marks to find a specific phrase:
“migrate to Trellix Endpoint security”
Use sets of quotation marks to search for multiple queries:
“endpoint security” “Windows”
Punctuation and special characters are ignored:
Avoid these characters: `, ~, :, @, #, $, %, ^, &, =, +, <, >, (, )
The search engine is not case sensitive:
Endpoint security, endpoint security, and ENDPOINT SECURITY will all yield the same results.