Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Without Correlation, Your AppSec Testing Approach Needs an Update Stephen Gates, Application Security Expert at Checkmarx Unlike monolithic applications of the past, where coding was all in the same language, an average cloud-native application can have anything from 50-5... August 18, 2022 7:00pm Protecting and Securing the Future of Work: A VMware Fireside Chat Nick Cavalancia - Techvangelism | Zeus Kerravala - ZK Research | Jay Thontakudi - VMware Cyber attackers have been enjoying favourable conditions for attacks in recent years. The shift to remote In a hybrid work environment, you have to ke... 1 day ago | 46 mins How to Protect Your Applications in the Multi-Cloud Eyal Arazi Most organizations today deploy applications across three, four or five different cloud environments, meaning they frequently must use multiple applic... 6 days ago | 31 mins How to Leverage Threat-Informed Defense in Your Environment Mike McPhee - Cybersecurity Architect - Cisco Normally agility and innovation are good things. Unfortunately, adversaries have taken these traits to heart, leaving security operations overloaded a... August 24, 2022 12:00pm Live Attack & Defend Demo [EMEA] Tom Brown (EMEA Lead Falcon Complete, CrowdStrike), Alex Sayavedra (Director - Falcon Complete) Join the Falcon Complete Team for a live Attack & Defend Demo. In this scenario we will showcase ITP managed by Falcon Complete. The scenario entails ... 2 days ago | 37 mins Cross-cloud security controls: impossible dream or new frontier? Pali Surdhar, Director of Product Security, Entrust & Dale McKay, Senior Technical Marketing Architect, VMware The journey to the next generation of cloud-based deployments has created a “virtual” nightmare of tools, technologies, complexities, and vulnerabilit... August 24, 2022 3:00pm Combating Advanced Supply Chain, Cloud and Identity-Based Attacks [EMEA] Jason Rivera, Senior Director - Strategic Threat Advisory Group As organizations have rapidly migrated to the cloud, adversaries have honed their craft to exploit the gaps that leave businesses vulnerable to cybera... August 25, 2022 9:00am Protecting Apps and APIs with New WAAP Solution Stephen Archer, Senior Solutions Engineer, F5 and Matthieu Dierick, Solutions Architect, F5 Application security is rapidly evolving in a space where new challenges converge, from supply chain delays to accelerated adoption of digital experie... August 30, 2022 9:00am Making Modern Apps: Extending App Delivery to Dev & DevOps Teams Steve Pereira, Visible Value Stream Consulting It’s no secret that developers, architects, and DevOps engineers are tired of the stress and hassles of legacy application architectures, particularly... August 18, 2022 4:00pm Eliminate Ransomware Risks With the Right Backup Strategy Chris Snell, Senior Solutions Architect, Cobalt Iron Every 39 seconds, someone in the world gets hit with a cyberattack. When this happens, backup remains the last line of defense to protect most applica... August 18, 2022 4:00pm Load more