Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Where Will DevSecOps 'Shift' Next? Chai Bhat | Satish Swargam DevOps is terrific for delivering new innovative applications to the market. But the newer trend of “shift left, shift right, shift everywhere” has in... 1 week ago | 62 mins How To Protect Your DNS With A Real PDNS Implementation Paul Mockapetris, Chief Scientist at ThreatSTOP When it comes to implementing security for your systems, of course there are shortcuts you can take. But should you? Watch this video below as Paul wa... March 29, 2023 1:00pm High Yield Debt: Multi-Factor Investing & Scientific HY Investing Explained Benjamin Brodsky, CFA, Chief Investment Officer, BlueCove | Martin Nybye Sørensen, Head of Corporate Bonds at Jyske Capital MARTIN NYBYE SØRENSEN OF JYSKE CAPITAL will discuss how credit investors significantly benefit from including a structured approach to multi-factor in... March 27, 2023 1:00pm Shifting to a Zero Trust security model Emre Tezisci (Product Marketing Manager, Barracuda), Daniel Ekroth (CIO, Sparc Group) Join our webinar and discover how ZTNA can: Prevent unauthorised access to corporate resources and digital assets. Reduce your overall attack surface ... March 28, 2023 9:00am Introduction to Sector-Based Investing Henry Cobbe An introduction to Sector-based investing as an alternative approach to world equity implementation. March 29, 2023 9:30am Driving Better Business Outcomes: How to Fuel Your MDM Strategy Alyssa Sliney, MDM Global Practice Lead and Ricardo Rosales, SVP Sales America Even the largest avalanche is triggered by small things. Poor Master Data Management can cause similar impacts when seemingly small issues like data e... 4 days ago | 31 mins How to Implement Threat Monitoring for Application Security Mike Woodard, VP of Product Management for Application Security & Daniel Shugrue, Senior Product Marketing Manager Digital.ai You know protecting your apps is critical. How can you take it to the next level? Hear straight from our security experts! Join us for an interactive ... 3 days ago | 59 mins Cyber Notes Cast - Applying Zero Trust to PAM senhasegura The implementation of the Zero Trust-based security model has gained space in recent times, promoting the default approach of never trusting, and alwa... March 29, 2023 3:00pm How Hackers Bypass MFA… And How to Stop Them Cybersecurity Experts from Zimperium & RSA Multi-factor authentication (MFA) is a key component to achieving Zero Trust, as it adds a secondary line of protection before allowing access to netw... 3 days ago | 29 mins Optimize the implementation of PCI-DSS v4.0 on endpoint security Ralph Villanueva, IT Security and Compliance Analyst | Hilton Grand Vacations PCI Data Security Standard is a global standard for protecting account data. The latest version PCI-DSS v4.0 was finalized last year. This new standar... April 5, 2023 9:00pm Load more