Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Accelerate Digital Trust: The Power of End-to-End Identity Proofing Platforms David Mattei - Aite-Novarica Group; Santosh Rajvaidya, Simon Winchester, Samer Attasi Nearly 90% of businesses have seen higher fraud losses since the pandemic began, most coming from online customer onboarding. But fraud doesn’t stop a... 4 weeks ago | 59 mins 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... 2 months ago | 61 mins Innovation Showcase Ep.2: A standard approach to custom SOC Verizon The security industry knows a large number of terms that all describe managed SOC-based services: MSS, MDR, Managed SIEM, Advanced SOC, etc. Furthermo... March 23, 2023 4:00pm Inline TLS/SSL Decryption: What We've Learned after 1,000+ Deployments Greg Maples, CISSP, Principal Solutions Architect - Gigamon + Ollie Sheridan, Consulting Sales Engineer, Security - Gigamon Let's be honest, deploying inline decryption — even with Gigamon — is not a walk in the park. But if you don't decrypt, you have a huge blind spot in ... 5 days ago | 42 mins The Daily Need For Threat Vector and Vulnerability Analysis Julia Grunewald, Sr. Director, Product Management, Tanium Lucas Lyon, Director, Technical Product Management, Tanium In today's distributed environment, new threat vectors and vulnerabilities emerge daily. For organizations, agility will be the most important attribu... April 4, 2023 3:00pm How to Comply with Current EU Regulations NIS2 & RCE Roman Cupka, Cybersecurity Expert at Progress Software Within 20 months, individual EU Member States are expected to transpose the NIS2 and RCE directives into national legislation. It will concern not onl... April 4, 2023 9:00am Simplify and Enforce Network Compliance (Americas) Claudio Pallais, Senior Content Marketing Manager Maintaining IT regulatory compliance grows costlier and more cumbersome every year as your network grows larger and more complex. Network change and c... 2 weeks ago | 17 mins Simplify and Enforce Network Compliance (EMEA) Claudio Pallais, Senior Content Marketing Manager Maintaining IT regulatory compliance grows costlier and more cumbersome every year as your network grows larger and more complex. Network change and c... 2 weeks ago | 15 mins Deep Observability Pipeline: What It Is and Why It Matters Stephen Goudreault, Gigamon and Bassam Khan, Gigamon In today's hybrid and multi-cloud world, it’s more important than ever for infrastructure and security teams to get unified visibility across multiple... March 28, 2023 12:00am 5 Minute Briefing – What is Perpetual KYC (P-KYC) and Why Use This Approach? Neil Isherwood - Compliance Expert & Strategy Leader, Dun & Bradstreet The term Perpetual KYC (P-KYC) has taken off in the last 12-18 months, but what is it? Most firms currently take a snapshot view of due diligence in a... 3 weeks ago | 6 mins Load more