Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Distributed Cloud Services: Less Pain, More Gain Bart Salaets, Field Chief Technology Officer - F5 Modern applications are no longer single, monolithic entities but are broken down into multiple microservices communicating through APIs – often deplo... 13 hours ago | 33 mins Secure Every Part of Your Business: Data Protection in 2023 Nick Cavalancia, Conversational Geek | Adrian Moir, Technology Strategist & Principal Engineer, Quest Backup is your last line of defence when it comes to ransomware attacks. You need to ensure your systems, applications and data are protected and also... 5 days ago | 47 mins Putting Zero Trust into Action to Secure the Hybrid Workforce Mike Crouse, Director, Enterprise User & Data Protection, Forcepoint | Heath Mullins, Senior Analyst, Forrester A fireside chat with guest speaker, Forrester Senior Analyst Heath Mullins As we transition from a remote to a fully mobile, hybrid workforce, organi... February 15, 2023 9:00am 5 Ways to Establish Zero Trust in the Cloud with Orca Security and AWS Ty Murphy, Director of Product Marketing at Orca Security & Dudi Matot, Security Segment Lead at AWS Establishing a Zero-Trust program is a critical strategy to help security teams govern security across cloud and on-premise environments. As an AWS So... February 16, 2023 7:00pm Protect Against Modern Active Directory Attacks Patrick Doherty (Vice President Sales Identity Protection), Matthew McDermott (Sales Engineer) The adversary has evolved. 80% of modern attacks are identity-driven and Active Directory (AD) is often considered the weakest link in an organization... February 28, 2023 10:00am Protect Against Modern Active Directory Attacks [EMEA] Patrick Doherty (Vice President Sales Identity Protection), Matthew McDermott (Sales Engineer) The adversary has evolved. 80% of modern attacks are identity-driven and Active Directory (AD) is often considered the weakest link in an organization... 2 months ago | 60 mins Is AI the Panacea to Doing Threat Detection Right? George Anderson - Secureworks, Nash Borges - Secureworks, Rebecca Wynn - Click Solutions Group and Simon Ratcliffe - Ensono The rise of AI has made its way to threat detection. With AI-enabled threat detection systems predicting new attacks and notifying admins of data brea... 2 months ago | 55 mins The Real Cost of Bad Software Quality in the U.S. in 2022 Herb Krasner, CISQ Advisory Board Member and Mike McGuire, Solutions Manager at Synopsys Tune in to learn more about “The Cost of Poor Software Quality in the US: A 2022 Report” that was recently published by CISQ. The 2020 edition of th... 2 months ago | 51 mins Exploring the Multiverse of Modern Data Protection with Pure Storage Jason Walker | Principal Field Solutions Architect, Chad Monteith | Principal Field Solutions Architect, Pure Storage Who knew that the best coffee break conversations would end up happening online? Each month, Pure’s Coffee Break series invites experts in technology ... 6 hours ago | 54 mins How To Mature Cloud-native Application Security Programs Scott Simpson (Veracode) and Jim Canup (Optiv) APIs, containers, and clouds, oh my! Organizations use modern software development to deliver incredible user experiences and better performance. Just... 9 hours ago | 35 mins Load more