Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to maintain security in a hybrid work environment Thomas Wingfield, Product Marketing Manager & Molita Sorisho, Product Marketing Mngr & Sanjay Khanna, Product Manager @ Webex Security is paramount today. With people now working from everywhere, your risk surface has expanded. Even if your databases and networks are protecte... 2 days ago | 30 mins Security Master Chef: A Visibility and Response Recipe for Any Cloud Environment Joshua Cowling - Consulting Sales Engineer at Splunk Angelo Brancato - Executive Cyber Security Advisor at Splunk Organizations are adopting cloud services at a rapid speed, and security incidents are spanning across on-premises, multi-cloud platforms, and many un... July 5, 2022 12:00pm Biggest Cybersecurity Challenges of 2022: Are You Prepared? Lisa Forte - Cybersecurity, David Warburton - Threat Research Manager, F5 and Matthieu Dierick - Solutions Architect, F5 Join us for an exclusive myForum event where we explore and debate the most pressing cybersecurity concerns of 2022, and more importantly how organisa... July 5, 2022 9:00am Cyber fraud in 2022: current threats and prevention techniques Ekaterina Danilova, Business Development Manager, Kaspersky Fraud Prevention In 2021, while life began to return to normal, fraudsters and cyber-criminals continued to keep their fingers on the pulse, adjusting their schemes to... July 5, 2022 5:00am Securing Apps Starts with Securing Kubernetes Mark Boddington Solutions Architect and Philippe Cloup Senior Solutions Architect When an application enters production as a container, it arrives as a changeless artifact. The first few moments of its existence are spent communicat... 4 days ago | 63 mins Moving Beyond Traditional App Security Tools Melinda Marks, Senior Analyst, ESG | Jay Coley, Sr. Security Architect, Fastly Traditional application security tools are not solving today’s problems and traditional tools can create more problems than they solve. False positive... 2 weeks ago | 24 mins 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... July 7, 2022 9:00am Zero Trust Security and Compliance for Modern Apps on Multi-Cloud Lucien Avramov, Director, Cloud Technologies at VMware, Pratik Roychowdhury, Director, Product Management, VMware This one-hour session will cover strategies and solutions for hardening Kubernetes environments, protecting users and keeping your data secure. Disc... July 19, 2022 4:00pm Cloud Security Costs: Are Your Tools to Blame? Jim Mandelbaum, CISSP, Gigamon Field CTO + Martyn Crew, Sr. Dir. Solutions Marketing - Gigamon Originally aired on an ActualTech Media webcast. Every organization is facing challenges when it comes to cloud security. The ever-increasing complex... July 6, 2022 1:00am API Security: Developing a Strategy That Keeps Pace With Your Business Lebin Cheng, Head of API Security, Imperva and Amy DeMartine, VP, Research Director, Forrester APIs are increasing exponentially. Driven by digital transformation projects, they are creating a huge opportunity for attackers. To better understand... 4 days ago | 49 mins Load more