Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to Defend against Microsoft Cloud Account Takeovers Curtis Wray and Sai Chavali, Proofpoint More than two-thirds of organizations are fighting cloud account takeovers in their environments. And practically everybody is facing credential compr... 2 months ago | 32 mins A look into the CXL device ecosystem and the evolution of CXL use cases Kurtis Bowman and Kurt Lender, CXL Consortium MWG Co-Chairs Compute Express Link™ (CXL™) is an industry supported cache-coherent interconnect for processors, memory expansion, and accelerators. CXL enables a hi... 3 days ago | 60 mins IT DD: De-risk acquisitions and accelerate value creation with Forrester Jasper Geurts, Principal US Consulting at SIG, and featured guest Bobby Cameron, VP and Principal Analyst at Forrester Redefining IT Due Diligence: Mature your M&A Process for Better Value Creation with Forrester Research Digitalization is changing the dynamics of M&A... 3 weeks ago | 61 mins The Lawyer's Guide to a Comprehensive Open Source Compliance Program Kate Downing, Law Offices of Kate Downing Note: This is the replay of a webinar that originally aired on Nov. 16, 2022. Today, nearly every company that builds applications uses open-source ... 4 days ago | 63 mins Cybersecurity Threats In Europe: What You Need to Know and What to Do About Them Fortra featuring Forrester In this webinar, Fortra experts Paolo Cappello, Managing Director International, and Steve Jeffery, Lead Solutions Engineer, are joined by Tope Olufon... 1 week ago | 58 mins Stop Network Intrusion Attacks with BIG-IP SSL Orchestrator and IPS Jay Kelley, Sr. Manager, Product Marketing , F5 | Kevin Gallagher, Product Manager Engineer, F5 With the immense volume of transport layer security (TLS) traffic on the internet, application layer security solutions don’t make a lot of sense with... 1 month ago | 34 mins Scaling IP Video Storage Solutions to Meet Today’s Campus Threats Joe Leonard – Biz Dev Mgr & Daniel Shaw – Biz Dev Mgr, GeoVision Marc Tanguay – Technical Mktg Mgr, Western Digital Learn about factors that affect storage requirements for large-scale IP Video Surveillance deployments - Data upon Data upon Data: Mass Storage Server... 3 months ago | 30 mins How BIG-IP and NGINX Ingress Controller Work Together Mark Dittmer, Sr. Product Management Engineer, F5 As network and security teams deploy F5 BIG-IP for security and performance, and DevOps teams look to BIG‑IP and NGINX solutions to create and manage ... 3 months ago | 60 mins IP Theft: Unraveling Cyber Threat Intelligence Alex Marjanovic, John E. Breen, Ankur Sheth, Philip N. Yannella, Scott Koller, Brent Riley The cross-roads between technology and law are becoming more evident through the unfortunate surge of data breaches, ransomware and data exfiltration ... 3 months ago | 61 mins 24/7 Cybersecurity for OT/ICS Daniel Trivellato, VP of OT Product and Engineering and Justin Foster, CTO & Co-Founder of Cysiv (a Forescout Company) With the rapidly evolving threat environment, CIOs and CISOs now recognize the importance of in-depth device and network visibility for their OT/ICS e... 3 months ago | 38 mins Load more