Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 5 Critical Capabilities To Go From Legacy To Modern Endpoint Security [EMEA] Anne Aarness (Sr. Product Marketing Manager), Rachel Scobey (Technical Product Marketing Manager) According to one estimate, there will be 29.3 billion networked devices globally by 2023. Organizations and security teams are facing challenges like ... 2 months ago | 40 mins Augmenting Identity Security with CBA—Even with an Existing IAM System in Place Geoff Cairns, Principal Analyst @ Forrester Research; Bassam Al-Khalidi, Co-CEO @ Axiad Certificate-based authentication (CBA) is fast becoming the preferred approach for authentication with organizations that are looking for a more-secur... 23 hours ago | 50 mins Own your keys, not your HSM Iain Beveridge - Product Marketing Manager, Entrust nShield as a Service is a subscription-based cloud solution for generating, accessing, and protecting cryptographic key material, separately from sens... 1 day ago | 33 mins Beyond Twitter – What is the Future of Identity Verification? David King, Chief Innovation Officer, Laurence Pawling, VP of Global Operations, Michelle Davidson, Content Marketing Manager Identity as we know it, is changing. In the wake of Elon Musk’s Twitter takeover, identity has hit the headlines; from the concept of identity itsel... 2 days ago | 37 mins Making Sense of Zero Trust Josh Green - Duo Technical Marketing Engineer While the concept of zero-trust networking is nearly a decade old, the last few years have seen its popularity in industry discussions grow exponentia... 22 hours ago | 36 mins Combating Control Failures: How Can Enterprises Stop Preventable Breaches? Andreas Wuchner - Advisor at Panaseer, Dr Rebecca Wynn - Global CISO at Click Solutions Group and Dom Glavach - CSO, CyberSN There’s no denying that the stress of working in cybersecurity in 2023 is huge. Security teams are dealing with increasingly complex environments, han... 1 day ago | 53 mins Prioritizing Risk Among the Chaos of Cloud Development Eric Kedrosky, CISO, Sonrai Security and Jeff Moncrief, Field CTO, Sonrai Security Cloud development has enabled amazing innovations and allowed our companies to move faster. It’s also completely broken the old methods for prioritizi... 1 week ago | 48 mins Cross-cloud security controls: impossible dream or new frontier? Pali Surdhar, Director of Product Security, Entrust & Dale McKay, Senior Technical Marketing Architect, VMware The journey to the next generation of cloud-based deployments has created a “virtual” nightmare of tools, technologies, complexities, and vulnerabilit... 1 week ago | 52 mins Building a Business Case for Identity Governance Andrew Silberman, Director, Product Marketing, Omada, and guest speaker Geoff Cairns, Principal Analyst at Forrester Research Identity is now at the forefront of many organizations’ approaches to cybersecurity. However, attempts at solving all the problems that arise from dig... 2 weeks ago | 45 mins Okta Insights: Building a world where Identity belongs to you Jim Katsos - Senior Manager, Solutions Engineering , Okta Everyone knows the fundamental impact that the consumer and SaaS apps explosion has made in how we live and work. It doesn’t matter if you're in the p... 2 weeks ago | 61 mins Load more