Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Through the Eyes of the Wolf: Insights into the Chain of Cyber Threats Stevan Sheely, Technical Solutions Architect, Cisco The once-upon-a-time security architecture that was just a stack of controls at mostly a point in the network for different security vectors is a meth... 1 day ago | 51 mins Securing Kubernetes at Scale: Deploying Uncrackable Clusters Keith Mokris, VP of Cloud Security Evangelism, Orca Security and Jacob Graves, Security Engineer, Orca Security Enterprises and cloud native organizations around the world have gravitated towards Kubernetes for powering their applications and tech stacks. Why? K... August 15, 2022 2:00pm 2021 OWASP Top 10: Broken Access Control - Ep 1 John Wagnon, Solutions Architect, F5 2021 OWASP Top 10: Broken Access Control - 01 94% of tested apps showed some form of broken access control. Failures can result in unauthorized disc... September 14, 2022 9:00am How to Leverage Threat-Informed Defense in Your Environment Mike McPhee - Cybersecurity Architect - Cisco Normally agility and innovation are good things. Unfortunately, adversaries have taken these traits to heart, leaving security operations overloaded a... August 24, 2022 12:00pm Coming Soon -- CISO Observability in the Boardroom Steve Levinson, VIce President, Risk, Privacy, and Security | Online Business Systems Cybersecurity has not only become a regular boardroom topic, but may soon be a requirement. If proposed SEC legislation takes hold, all publicly trade... 3 weeks ago | 30 mins Getting to Know SASE: Part 1 Kevin Beaver, CIISP, Independent Information Security Consultant, Principle Logic LLC As CSO Online explains, “Edge is the concept that moves computing from a centralized model to a decentralized one, away from datacenter consolidation ... 3 weeks ago | 16 mins Securing Kubernetes at Scale: Deploying Uncrackable Clusters Keith Mokris, VP of Cloud Security Evangelism, Orca Security and Jacob Graves, Security Engineer, Orca Security Enterprises and cloud native organizations around the world have gravitated towards Kubernetes for powering their applications and tech stacks. Why? K... 3 weeks ago | 52 mins Through the Eyes of the Wolf: Insights into the Chain of Cyber Threats Stevan Sheely, Technical Solutions Architect, Cisco The once-upon-a-time security architecture that was just a stack of controls at mostly a point in the network for different security vectors is a meth... 1 month ago | 51 mins Speed Matters: Strategies to Accelerate Security Velocity Dave Gruber, Principal Analyst, ESG and Steve Daheb, Chief Marketing Officer, Tanium In the IT world, the word “tool” and “platform” are sometimes used interchangeably, but they mean different things. And in cybersecurity, while it may... August 11, 2022 10:00pm Blind Management at the Campus? Open your Eyes with FortiGate Pat Vitalone Sr. Manager, Products and Solutions, Fortinet More and more connected devices, direct internet access, and the evolution of threats make management and service delivery more difficult at the campu... 6 hours ago | 44 mins Load more