Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Top 10 Azure security tips from 10 years of securing Azure applications Karl Ots, Head of Cloud Security | EPAM In the last 10 years, Azure has become one of the most popular cloud platforms for businesses and organizations of all sizes. As the platform has evol... 21 hours ago | 60 mins Considerations For The Modern Data Security Lifecycle Nick Savvides, Field CTO & Snr. Director of Strategic Business | Kevin Oliveira. Snr. Product Marketing Manager Don't let your organization become a data breach statistic. We know data security is one of the most complex areas of technology and that it requires... 4 weeks ago | 61 mins Taking Zero Trust to 100%: Best Practices to Support your Journey Alexandra Willsher, Forcepoint | John Leonard, Computing | Anne Cockshott, The Channel Company EMEA Zero Trust is widely regarded as the best approach for protecting organizations, but implementing it is a journey rather than a one-off purchase. The... 3 months ago | 38 mins How to leverage full cloud adoption in payments Darren Busby (MYHSM Global Head Sales) | Sudhir Kalidindi (AWS Principal Solutions Architect) | Suresh Vaghjiani (CLOWD9 CEO) Digital transformation and the global growth of electronic payments forges ahead with unprecedented momentum, but this growth potential does not guara... 3 months ago | 58 mins Automotive Cybersecurity: Device Tamper Protection & Secure Over-the-air Updates Priyank Kumar, Senior Director IoT and Payments Utimaco | Alois Kliner VP Automotive and IoT Manufacturing Utimaco Security risks do not commence when the production of the automobile is finalized; they begin at the point of manufacture, where individual components... 6 months ago | 61 mins Cyber Notes Cast - The Main Types of Cyberattacks in Cloud Environments senhasegura Cloud services facilitate the routine of companies and optimize their productivity, especially in the context of remote work. However, they can presen... June 9, 2023 3:00pm First Line of Defense: The State of the Security Team Andrew Hollister, LogRhythm CISO and Kevin Kirkwood, LogRhythm deputy CISO. Cybersecurity is not a one-person job, but rather an entire organizational effort. In 2022, LogRhythm sought to understand the current state of the se... 1 day ago | 52 mins Cybersecurity for Startups Chris Castaldo, CISO at Crossbeam | Author of Start-Up Secure & Jack Roehrig, Crystal Poenish, and Bronwen Hudson of Uptycs Cybersecurity is a requirement for every company in the world regardless of size or industry. And that’s a fact! But… if you’re looking to get your ... 4 days ago | 32 mins Cyber Notes Cast - The Biggest Vectors of Cyberattacks in SMEs senhasegura Small and medium-sized enterprises usually do not make or have the capacity to make large investments in digital security, which makes them vulnerable... 2 days ago | 5 mins Cyber Notes Cast - Concepts of Federated Identity Management senhasegura Federated identity management enables authorized users to access multiple platforms using a single set of credentials. In the past, each website or a... June 12, 2023 3:00pm Load more