Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date A CXO's guide to application security in the age of digital transformation Elango Balusamy, Co-founder & CTO | SquareShift Technologies Enterprises are increasingly relying on applications to drive business growth and success in the age of digital transformation. However, the rise of c... 8 hours ago | 21 mins Top 10 Azure security tips from 10 years of securing Azure applications Karl Ots, Head of Cloud Security | EPAM In the last 10 years, Azure has become one of the most popular cloud platforms for businesses and organizations of all sizes. As the platform has evol... June 8, 2023 12:00pm Considerations in application tooling Vincent Amanyi, Founder | Boleaum Inc. Tune into this session from industry thought leader Vincent Amanyi for insight on how to simplify you application security tooling and enable agility ... June 7, 2023 9:00pm Reduce Complexity of Scaling Cloud-Native Applications with Red Hat & Nutanix Harsha Kotikela, Director of Product and Solutions Marketing When creating modern cloud-native applications that span from edge to datacenter to cloud, legacy 3-tier infrastructure is just not enough. Scalabilit... 6 days ago | 28 mins How Multiple Sources of "truth" make Defense in Depth Impossible Geoff Fisher, Senior Director, Integration Strategy, Tanium The amount of data and telemetry being produced in most organizations is unmanageable, with the legacy security and operations “point solutions” scatt... 1 hour ago | 24 mins Live now What the Authn? How Passkeys Offer a Fresh Take to Authentication Dilemmas Derek Hanson, VP, Standards & Alliances, Yubico Everyone is talking about passkeys - but what are they, and what do they mean for the future of authentication? A passkey is a more secure replacement... June 6, 2023 4:00pm | 75 mins 2023 DBIR and VERIS Framework: Standardizing Incident Reporting Alex Pinto, Philippe Langlois You have reviewed the key findings, so now join us to talk about how the DBIR is supported by the VERIS (Vocabulary for Event Recording and Incident S... June 6, 2023 6:00pm Multicloud Cybersecurity Trend: Supercharged Strategies for Supercharged Threats Tony Lauro, Director, Security, Technology & Strategy, Akamai The cloud is the optimal environment for most workloads, with many organizations using multiple cloud providers to reduce risk, maximize agility, and ... June 8, 2023 5:00am Go Local: A strategy for expansion into high growth e-commerce markets Guillaume Tournand, VP of Growth, Worldline Digital Commerce COVID-19 has been a catalyst for accelerating the growth of digital commerce and digital payment in recent years. Since the pandemic, shopping habits ... 2 days ago | 41 mins Data Pipeline Orchestration in the Cloud Dave Kellermanns, Field CTO Advisor for Automation, Broadcom Automation is vital to successful data management, alleviating data scientists and data engineers of the manual, repetitive data science tasks. But th... June 7, 2023 3:00pm Load more