Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date New ways to eliminate fraud across the customer journey with phone intelligence Nemanja Nikolic, EMEA Regional Director, Telesign The digital economy lets consumers register, make purchases, and update their accounts in minutes. Unfortunately, this convenience invites fraud. How... 2 days ago | 30 mins How Pentest as a Service Fits Into a Modern Application Security Strategy Sean Ryan, Sr. Product Marketing Manager and Howard Holton, CTO, GigaOm Join this fireside chat with Howard Holton, CTO of GigaOm, to learn how Pentest as a Service (PTaaS) aligns to modern digital business cycles and fits... 3 months ago | 60 mins Beyond Zero Trust: The Future of Continuous and Granular Access Asad Ali, Senior Technologist, CTO Office, Thales The concept of Zero Trust security is not new. The term itself was coined more than a decade ago at Forrester with a general premise that all network ... 2 years ago | 59 mins How Continuous Control Automation is Solving One of the Biggest Risks in Cloud Wyatt Cobb, Founder & CEO, SOFTwarfare | Rashard Young, VP of Government Affairs, SOFTwarfare With the shift to cloud technologies, the risk configurations are different. According to Gartner, by 2023, 75% of cloud security failures will result... 2 years ago | 40 mins The Road to Autonomous IAM Rick Wagner, Director, Product Management and Patrick Gookin, Sr. Product Manager, Micro Focus Identity and Access Management today is too hard. There are too many manual processes, too many poorly equipped decision makers, and too many resource... 2 years ago | 45 mins Beyond Zero Trust: The Future of Continuous and Granular Access Asad Ali, Senior Technologist, CTO Office, Thales The concept of Zero Trust security is not new. The term itself was coined more than a decade ago at Forrester with a general premise that all network ... 2 years ago | 59 mins The Six Requirements for a Data Resiliency Plan Chris Mellon and James Keating Ransomware, data theft, hardware failure, and natural disasters are some of the threats to your data. Backup is your “restore of last resort,” used wh... 6 months ago | 44 mins Pivotal Cloud Foundry 2.6: A First Look Jared Ruckle and Dan Baskette, Pivotal Join Dan Baskette and Jared Ruckle for a view into Pivotal Cloud Foundry (PCF) 2.6 capabilities with demos and expert Q&A. We’ll review the latest fea... 4 years ago | 53 mins Insider Threats – Best Practices for Detecting and Preventing an Attack Josey George – Practice Head, Cyber Security and Risk Services and Des Powley – Director Security Alliances, CA EMEA Your biggest security risk may be inside your organization. Today’s most damaging threats don’t originate from criminal outsiders or malware but from ... 5 years ago | 61 mins Kubernetes Security: Detecting Lateral Movement and Defending Against Attackers Garwood Pang, Tigera Threat Defense Researcher As Kubernetes matures, gone are the days when we can fully compromise a cluster by just taking over a pod and sending commands to the Kubernetes API s... 3 years ago | 50 mins Load more