Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How Pentest as a Service Fits Into a Modern Application Security Strategy Sean Ryan, Sr. Product Marketing Manager and Howard Holton, CTO, GigaOm Join this fireside chat with Howard Holton, CTO of GigaOm, to learn how Pentest as a Service (PTaaS) aligns to modern digital business cycles and fits... 1 week ago | 60 mins Beyond Zero Trust: The Future of Continuous and Granular Access Asad Ali, Senior Technologist, CTO Office, Thales The concept of Zero Trust security is not new. The term itself was coined more than a decade ago at Forrester with a general premise that all network ... 1 year ago | 59 mins Beyond Zero Trust: The Future of Continuous and Granular Access Asad Ali, Senior Technologist, CTO Office, Thales The concept of Zero Trust security is not new. The term itself was coined more than a decade ago at Forrester with a general premise that all network ... 2 years ago | 59 mins The Six Requirements for a Data Resiliency Plan Chris Mellon and James Keating Ransomware, data theft, hardware failure, and natural disasters are some of the threats to your data. Backup is your “restore of last resort,” used wh... 4 months ago | 44 mins How Continuous Control Automation is Solving One of the Biggest Risks in Cloud Wyatt Cobb, Founder & CEO, SOFTwarfare | Rashard Young, VP of Government Affairs, SOFTwarfare With the shift to cloud technologies, the risk configurations are different. According to Gartner, by 2023, 75% of cloud security failures will result... 2 years ago | 40 mins Adopting Zero Trust for Remote Access Ajay Kumar, Director for Security Engineering - APJ, BeyondTrust By definition, a Zero Trust security model advocates the creation of zones and segmentation to control sensitive IT resources. This also entails the d... 2 years ago | 61 mins The Road to Autonomous IAM Rick Wagner, Director, Product Management and Patrick Gookin, Sr. Product Manager, Micro Focus Identity and Access Management today is too hard. There are too many manual processes, too many poorly equipped decision makers, and too many resource... 2 years ago | 45 mins Implementing Zero Trust in Government Agencies: How to Think Beyond Identity Victor Martinez, Senior Cyber Engineer, Forcepoint As enterprise networks change to support remote users and cloud-based assets that are not located within an enterprise-owned network boundary, securit... 3 years ago | 44 mins Employing Vulnerability-based Change Automation Ron Kehoe, Strategic Solution Engineer, West, Tufin In this TechTalk, "Vulnerability Management", we will explain how to employ vulnerability-based change automation to enable customers to expand their ... 2 years ago | 28 mins Designing NGVA Systems for Real-Time Data Flow with DDS and TSN Fernando Garcia, Principal Software Engineer, RTI & Alicia Alonso, Business Development Manager, SoC-e For a new generation of military vehicles, the NATO Generic Vehicle Architecture (NGVA) provides a highly reliable approach to platform design and int... 2 years ago | 55 mins Load more