Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Optimizing cloud application security through relevant ISO standards Ralph Villanueva, IT Security and Compliance Analyst | Hilton Grand Vacations The concept of cloud applications have gone a long way from the days of peer to peer file sharing to modern enterprise solutions hosted in massive dat... 2 days ago | 58 mins Zero Trust Architecture. Establishing a security blueprint: step by step Dr. Christopher Meyer, Product Manager Utimaco | Dr. Fabian Eidens, Technology Manager Utimaco Zero Trust Architecture. Establishing a security blueprint - step by step, brick by brick: Things to bear in mind when building your Zero Trust Archit... 3 days ago | 62 mins A CXO's guide to application security in the age of digital transformation Elango Balusamy, Co-founder & CTO | SquareShift Technologies Enterprises are increasingly relying on applications to drive business growth and success in the age of digital transformation. However, the rise of c... 4 days ago | 21 mins Multicloud Cybersecurity Trend: Supercharged Strategies for Supercharged Threats Tony Lauro, Director, Security, Technology & Strategy, Akamai The cloud is the optimal environment for most workloads, with many organizations using multiple cloud providers to reduce risk, maximize agility, and ... 2 days ago | 28 mins Insights from 2023 Cyberthreat Defense Report Karl Triebes, SVP & GM, Application Security - Imperva and Steve Piper, Founder & CEO - CyberEdge Group CyberEdge’s 2023 Cyberthreat Defense Report is a comprehensive report that profiles the perceptions of 1,200 IT security professionals representing 17... 2 days ago | 57 mins Data Security in the Cloud: Mission Impossible? Ed Amoroso (TAG Cyber) Colin Igbokwe (AWS) Dave Stuart (Laminar) Join us for an exclusive webinar featuring cybersecurity leaders from TAG Cyber, AWS, and Laminar as they uncover the secrets to unlocking your maximu... June 12, 2023 5:00pm Securing Customers’ Big Data: Sigma Makes It Easy with Normalyze Rahul Gupta (CISO, Sigma Computing) and Gautam Kanaparthi (Head of Product, Normalyze) No code, no data models, no training -- Sigma Computing offers its customers an easy and reliable way to analyze billions of rows of data and make inf... 2 days ago | 32 mins CISO's Roadmap to Cloud Security: Tackling Threats with Innovative Strategies Nesh (Steven Puddephatt) - Senior Solutions Engineer & Francesco Altomare - Southern Europe Regional Manager @ GlobalDots Today's CISOs face a daunting array of security threats. From ransomware and cloud misconfigurations to zero-day exploits and code vulnerabilities, th... June 15, 2023 12:00pm How To Create a More Secure World: Replacing Inadequate VPNs with ZTNA Security Evangelist - Jon Taylor The global pandemic and rise in remote work has forced organizations to review how they provide remote workers access to IT resources. Existing soluti... 2 days ago | 30 mins The Human and Machine Identity Problem in SaaS Environments Tim Davis, Head of Solutions Engineering, DoControl Software as a Service (SaaS) applications bring the promise of business agility and enablement. But like any technology that provides significant bene... 2 days ago | 26 mins Load more