Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Top Challenges With Shifting Security to Development Melinda Marks, Enterprise Strategy Research Group (ESG) | Tim Mackey, Synopsys With modern processes, software developers can quickly build and release applications by deploying them to the cloud. But security teams are strugglin... 4 months ago | 52 mins The FAIR data movement and data protection Alan Morison, Advanced Data Technologies Consultant and Writer Tired of data sprawl, not knowing where your company's data is, or how to reduce data mismanagement risk? You may not know it, but encouraging your le... 4 weeks ago | 52 mins Rethinking Network-Centric Observability for Cloud Security Andy Idsinga, Sr. Strategic Cloud Architect, cPacket Networks Service downtime is more expensive than ever and ensuring consistent access to mission-critical applications and good end-user experience is essential... March 22, 2023 9:00am The Hole in Your Zero Trust Strategy: Unmanageable Applications Matt Chiodi, Chief Trust Officer If 61% of cloud applications don’t support single sign-on, how will you include them in your Zero Trust strategy? Everyone is talking about Zero Trust... 5 days ago | 47 mins Securing the Digital, Distributed Enterprise Shahnawaz BACKER, Senior Solution Architect, F5 The unprecedented disruption over the last couple of years has structurally altered the composition and defining characteristics of the enterprise IT ... March 30, 2023 9:00am Effective Ways to Augment Your Microsoft 365 Defence Jennifer Cheng, Cybersecurity strategy, APJ, Proofpoint | Alex Sheppard, Sr Sales Engineer, Proofpoint Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. Default email and cloud se... March 28, 2023 3:00am Take Control of Your Cloud Data Security Terry Ray, SVP, Data Security GTM, Imperva & Author Richard Stiennon of IT Harvest Take Control of Your Cloud Data Security: Best Practices for Proactive Protection in Any Cloud Service Looking to secure your cloud data but don't kn... March 23, 2023 4:00pm Connecting The Digital, Distributed Cloud Benjamin Hickey, RVP, Distributed Cloud, F5 The unprecedented disruption over the last couple of years has structurally altered the composition and defining characteristics of the enterprise IT ... 5 days ago | 7 mins Bridging the Academic to Military Divide in ROS 2 Neil Puthuff, Senior Application Engineer, RTI ROS was created by and for the use of robotics researchers and educators. It has an open, hackable architecture that encourages experimentation, but t... March 30, 2023 3:00pm Being Proactive with Security: Web Application Penetration Testing Iulian Rotaru, SecurityScorecard | Megann Freston, SecurityScorecard As web applications continue to grow in complexity and sophistication, ensuring their security has become an increasingly daunting challenge. From eme... 3 weeks ago | 53 mins Load more