Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Securing IoT and Managing the Identity of Machines Rob Dobson (Device Authority), Robert Hann (Entrust) With the number of active IoT devices expected to grow to 21.5 billion over the next few years, securing the IoT and provisioning those devices with c... September 27, 2022 2:00pm 5 Easy Steps to Connect and Secure IoT Devices Robert Dobson, Device Authority and Jon Hill, InVMA Sign up to this webinar to learn: - How to connect your devices - Challenges of securing devices, applications and data, and how to overcome them - Re... 3 years ago | 50 mins The Three Words Shaking Up IAM: Machine Identity Management Michael Thelander, Director of Product Marketing, Venafi It’s not often that the oldest category in cybersecurity – identity and access management, or IAM – sees seismic changes. Then the Gartner Hype Cycle ... 2 years ago | 37 mins Five Must-Do Security Strategies to Combat Account Takeover Fraud Chris Godfrey, Fraud Intelligence Lead Since 2014, markets have been hit hard with a growing surge of account takeover fraud. In fact, in 2018 account takeover losses were an estimated $5 b... 3 years ago | 54 mins Fighting Fraud Without Friction Diana Kelly, Security Curve As consumers and companies have flocked to online platforms, so too have cyber attackers. The same tools that make it easy to do business online, from... 8 months ago | 20 mins Five Tips for Securing and Managing your IoT environment with PKI Vishvas Patel, VP Product & Chief Architect and Rao Cherukuri, CTO Learn how 1. to use PKI for strong authentication, data encryption & code signing for IoT devices; 2. to establish identities to IoT Devices with uniq... 3 years ago | 53 mins Internet of Medical Things: How to Design and Deliver Secure Connected Products Device Authority – Rob Dobson, PTC – Stefan Küsgen, SyroCon – Thomas Baumgart The Internet of Medical Things, or Healthcare IoT, refers to a connected infrastructure of medical devices and software applications that can communic... 4 years ago | 59 mins Managing Your WAF, Your Way Pratyush Sinha, Technical Account Manager, Akamai With 178 billion WAF rule triggers every 24 hours, Akamai harnesses unmatched visibility into attacks to deliver curated and highly accurate WAF prote... 2 years ago | 48 mins Software Supply Chain: Code-to-Code Combat Eddie Glenn, Sr. Product Marketing Manager, Venafi Is your agency doing everything it can to protect its software from foreign interference? From third party software libraries to in-house developed ap... 2 years ago | 56 mins What's New with Venafi TLS Protect – 21.1 and 21.2 Releases Aaron Hixson, Sr Prod. Mgr., Hristo Todorov, Prod. Mgr, Jason Brothers, Core Architect, Diane Garey, Prod. Mkt. Mgr, Venafi In this webinar, we’ll highlight new capabilities in the Venafi Platform and TLS Protect 21.1 and 21.2 releases, starting with new Adaptable Credentia... 1 year ago | 58 mins