Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 2021 OWASP Top 10: Security Misconfiguration - Ep 5 John Wagnon, Solutions Architect, F5 Security Misconfiguration is a major source of cloud breaches. Learn what to do and avoid—as modern app development, software re-use, and architectura... 2 hours ago | 10 mins 5 Ways to Establish Zero Trust in the Cloud with Orca Security and AWS Ty Murphy, Director of Product Marketing at Orca Security & Dudi Matot, Security Segment Lead at AWS Establishing a Zero-Trust program is a critical strategy to help security teams govern security across cloud and on-premise environments. As an AWS So... February 16, 2023 7:00pm Getting to Know the F5 Distributed Cloud Platform - Ep 1 Raffaele D'Albenzio Manager Solutions Engineering, F5 and Bart Salaets Senior Director Solutions Engineering, F5 Experience the look-and-feel and get an understanding of the main concepts and building blocks of the F5 Distributed Cloud Services Platform. This Saa... February 22, 2023 10:00am Putting Zero Trust into Action to Secure the Hybrid Workforce Mike Crouse, Director, Enterprise User & Data Protection, Forcepoint | Heath Mullins, Senior Analyst, Forrester A fireside chat with guest speaker, Forrester Senior Analyst Heath Mullins As we transition from a remote to a fully mobile, hybrid workforce, organi... February 15, 2023 9:00am Simplifying Cloud Security - A SANS Review of Forcepoint ONE Matt Bromiley, SANS Analyst | Mike Schuricht, VP, Products, Forcepoint Join SANS instructor Matt Bromiley and Mike Schuricht, VP of Product Management from Forcepoint, for an in-depth review of the Forcepoint ONE Security... March 8, 2023 9:00am Compromises Have Moved Beyond the Endpoint - You Need to Too! Nick Cavalancia - Techvangelism, Stacy Leidwinger - Secureworks, Kevin Johnson - Secure Ideas, Peter Jones - CISO The last few years have seen 10 years of digital transformation compress into 3 years and as a result, the entire architecture behind IT has changed b... 3 weeks ago | 49 mins Creating the New WAF Boundary - Ep 2 Mohamed Shaath, Solutions Architect, F5 and Philippe Cloup, Senior Solutions Architect, F5 Learn how F5 Distributed Cloud Services provide you with a new Web Application Firewall (WAF) boundary to help protect your web applications and APIs ... March 1, 2023 10:00am Criteria for Selecting the Right Threat Detection & Incident Response Solution Nick Cavalancia - Techvangelism | George Anderson - Secureworks | Cat Coode - Binary Tattoo | Dom Glavach - CyberSN.com Selecting the right threat detection and incident response solution for your organization can be overwhelming. From Endpoint Detection & Response (EDR... 4 weeks ago | 46 mins Live now Complete Zero Trust For Your Users Riccardo Galbiatta, Philip Cao, Leonard Neil KleinMan, Nick Sampson, Gilbert Joseph & Jonathan Cardenas Zero Trust with Zero Nonsense. With thousands of customers and deployments across the entire cybersecurity ecosystem, we know security is never one si... February 7, 2023 11:00am | 104 mins IDC Insight: Business Value of VMware NSX Advanced Load Balancer Brad Casemore (Research Vice President, Datacenter & Multi-Cloud Networks IDC), Lei Yang (Director Product Marketing VMware) Enterprises adopting multi-cloud and microservices architectures require modern approaches to application delivery, including load balancing and web a... 2 hours ago | 51 mins Load more