Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date A Modern Approach to Application Security Janet Worthington, Sr Analyst | Jeff Lawson, Product Mgmt | Peter Monahan, Dir, SA | Vishrut Iyengar, Product Marketing Securing today's applications requires a new approach. You need to deliver new applications and API’s, fast. Unfortunately, this “need for speed” can... 2 months ago | 58 mins How to Leverage Threat-Informed Defense in Your Environment Mike McPhee - Cybersecurity Architect - Cisco Normally agility and innovation are good things. Unfortunately, adversaries have taken these traits to heart, leaving security operations overloaded a... January 31, 2023 1:00pm The State of the Cybersecurity Talent Gap Simone Petrella, CEO and Co-Founder of CyberVista An estimated 402,000 US-based jobs are unfilled due to a lack of qualified talent. AI and automation don’t eliminate the need. All academic programs c... 6 days ago | 40 mins IT Director Pain and DNS Compliance Risks Peter LaMantia, CEO, Authentic Web Inc. Managing domains, DNS, and certificates in a large company is painful and irritating. Getting it right and identifying change management compliance ... 2 weeks ago | 29 mins Addressing the Cyber Skills Gap Bec McKeown Having the right skills in place throughout an organization is vital regardless of sector but cybersecurity seems to be experiencing a skills gap that... February 8, 2023 4:30pm Securing and optimizing RHEL environment with Insights & Ansible Joachim von Thadden, Red Hat | Hervé Lemaitre, Red Hat Maintaining a secure environment for your enterprise is a key goal for any company yet this task is becoming more complex with increased sophisticatio... 6 days ago | 30 mins Looking Forward in 2023 - Cybersecurity Trends and Predictions Imperva Office of the CTO, Kunal Anand and Peter Klimek 2022 proved to be a year of global disruption on a variety of levels. As a result, IT professionals were forced to reprioritize their approach to cybe... 3 days ago | 61 mins Securing the Software Supply Chain Jeff Martin, Vice President of Product Management at Mend Securing the Software Supply Chain Key Findings From the Mend Open Source Risk Report Open source vulnerabilities are in permanent growth mode. A sig... February 2, 2023 6:00pm Finding the balance between security and your customer’s digital experience Jim Katsos, Manager Solutions Engineering, Okta Whether your business is just getting started or well on its way, your online presence will play a vital role in how customers experience your busines... February 7, 2023 1:00am Salesforce and SOX: Beyond the Audit Trail Paul Staz (VP of Sales and Marketing at Strongpoint, now part of Netwrix) Salesforce is a famously versatile, highly customizable platform. Which is great if you’re a growing company looking for a platform that will grow alo... 2 weeks ago | 38 mins Load more