Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Key Zero Trust Considerations: Adapting to Enterprise Business Requirements Dan Petrillo, Director of Product Marketing, Akamai Cyberthreats have become more aggressive in recent years, as advanced persistent threats elude detection through stealth and ransomware attacks maximi... June 20, 2023 1:00pm Why Firewalls Cannot Do Zero Trust Kamil Imtiaz, Sr. Product Marketing Manager, at Zscaler & Ankit Gupta, Sr. Product Marketing Manager at Zscaler Businesses have significantly changed since the introduction of the firewall. Today's enterprise employees can work anywhere and everywhere—at a home ... 1 month ago | 56 mins How Geopolitical Tensions Shape the Threat Landscape and Impact Cybercrime Ryan Westman Join this webinar with Ryan Westman, Sr. Manager, Threat Intelligence at eSentire and learn more about: - The key drivers of state-sponsored cyberatt... 2 months ago | 25 mins Protecting the Enterprise with a Unified Zero Trust Platform Approach Carlos Rivera, Senior Analyst, Forrester and John Yun, VP of Marketing and Strategy, ColorTokens Inc We are excited to welcome you to a discussion with guest speaker Carlos Rivera, Senior Analyst at Forrester, and John Yun, VP of Marketing at ColorTok... 2 months ago | 44 mins See a Demo of Zimperium MTD | Plus a Deeper Dive on Zero-Touch Deployment Brian Thornton, Sales Engineer at Zimperium Interested in learning more about the day-to-day impact of Mobile Threat Defense on your overall security? Join a member of the Zimperium Sales Engine... 2 months ago | 33 mins Proven defense tactics for amplification DDoS attacks Omer Yoachimik, Product Manager, DDoS Protection Alex Forster, Systems Engineer A new zero-day vulnerability has been discovered that can be exploited to launch disruptive DDoS attacks using UDP amplification. This attack vector i... 4 months ago | 34 mins How Hackers Bypass MFA… And How to Stop Them Cybersecurity Experts from Zimperium & RSA Multi-factor authentication (MFA) is a key component to achieving Zero Trust, as it adds a secondary line of protection before allowing access to netw... 2 months ago | 29 mins Making Sense of Cybersecurity Best Practices Chris Kubic, CISO What do CISA’s new strategy, the DoD’s Zero Trust strategy, the standing executive order, and NIST guidance have in common? If you said, “They all lay... 4 months ago | 59 mins Race Against Time: What to do when a zero-day attack strikes Jason Spindlow, Systems Engineer Specialist for Cortex Three words are often associated with a zero-day attack – vulnerability, exploit and attack. Given that no software patch exists for a zero-day vul... 4 months ago | 58 mins 24 hours of Log4J within Barracuda's Security Operation Centre (SOC) Merium Khalid (Sr. SOC Manager, Offensive Security, Barracuda) Get an in-depth look at the Log4J Zero-Day Vulnerability and the strategies and solutions to protect your business from exploitation, including ransom... 4 months ago | 30 mins Load more