Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Passwordless Authentication for Zero Trust Access to Apps and Infrastructure ESG: Jack Poller (host/moderator) Palo Alto Networks: Imran Bashir Okta: Jamie Fitzgerald As organizations transition from traditional castle-and-moat to zero trust security strategies, they need to strengthen and enhance their authenticati... April 4, 2023 4:00pm Prevent Account Takeover and Fraud with reCAPTCHA Enterprise Badr Salmi - Product Manager, Fraud Protection and Bot Management Detecting and responding to bots and fraud has become vital to organizations and ensuring security for their users. Attackers are carrying out more so... 4 days ago | 35 mins How to Prevent Attacks that Bypass MFA Nick Biasini, Head of Outreach for Cisco Talos and Ganesh Umapathy, Duo Product Marketing Manager Implementing Multi-Factor authentication (MFA) is one of the most effective ways to reduce the risk of a data breach. The popularity of cloud-based se... 5 days ago | 64 mins Understanding Bots: Protecting your Customer Experience… and Bottom Line Susan McReynolds, Akamai | Christine Ross, Akamai | Tony Lauro, Akamai | David Senecal, Akamai Maintaining and deepening customer trust is imperative, especially in a post-pandemic world where brand loyalty is up for grabs. With the unprecedente... 3 days ago | 42 mins Innovation Showcase Ep.1: Transform your security with zero trust protection Verizon The security edge has expanded due to a decentralized remote workforce and cloud adoption. Remote users accessing applications, data, and services tha... 1 week ago | 55 mins Keep Your Applications Secure with Okta Attack Protection Jim Katsos, Manager SE, Jithesh Gopan, Sr SE, & Nabeel Saeed, Senior PMM, Okta The recent spate of high-profile cyber-attacks has spurred many organizations to revisit their online customer identity security posture. When it c... April 11, 2023 4:00am Vendor Access Best Practices with Vendor PAM CyberArk "Your organization likely leverages one or more vendors to support infrastructure, scale computing resources, provide managed IT services, or other ar... 2 months ago | 32 mins The State of Mobile Phishing in 2023: Why It’s Here To Stay Hank Schless, Director of Global Security Campaigns, Lookout & Tyler Croak, Principal Strategist, Lookout Mobile phishing is arguably one of the most effective ways for attackers to steal employee login credentials. With legitimate usernames and passwords ... April 13, 2023 1:00am The State of Mobile Phishing in 2023: Why It’s Here To Stay Hank Schless, Director of Global Security Campaigns, Lookout & Tyler Croak, Principal Strategist, Lookout Mobile phishing is arguably one of the most effective ways for attackers to steal employee login credentials. With legitimate usernames and passwords ... April 13, 2023 8:00am The State of Mobile Phishing in 2023: Why It’s Here To Stay Hank Schless, Director of Global Security Campaigns, Lookout & Tyler Croak, Principal Strategist, Lookout Mobile phishing is arguably one of the most effective ways for attackers to steal employee login credentials. With legitimate usernames and passwords ... April 13, 2023 4:00pm Load more