Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Using Zero Trust to Protect Remote and Home Workers Mark Guntrip, Menlo Security | Jason Clark, Independent Security Researcher | Dark Reading When COVID-19 hit, many organizations attempted to implement Zero Trust environments to protect their data from online threats presented by unsecured ... 5 months ago | 64 mins Zero Trust Series: State of Zero Trust: Latest Insights from NetIQ Harley Adams, Director of Product Marketing, NetIQ and Kent Purdy, Senior Product Marketing, NetIQ, OpenText Enterprises are increasingly embracing zero trust as a necessary strategy for securing the business and proactively managing risk. Identity and privil... 1 month ago | 51 mins Getting a Step Ahead of the Attacker with Vulnerability Scanning & Pen Testing Dan Murphy, Distinguished Architect, Invicti Security A panel discussion that has aired initially as part of the Dark Reading Virtual Event, sponsored by Invicti: Today’s threat landscape calls for a mor... 2 months ago | 49 mins How to Protect Your Legacy Software Applications Frank Catucci, CTO and Head of Security Research This panel discussion has originally appeared as part of the Dark Reading Virtual Event, sponsored by Invicti. Agile development and continuous integ... 2 months ago | 62 mins Building and Maintaining an Effective Remote Access Strategy Brad Causey, SecurIT360 | Nick Edwards, Menlo Security | Becky Bracken, Dark Reading The COVID-19 pandemic transformed enterprises into remote workplaces overnight, forcing IT organizations to revamp their computing and networking stra... 7 months ago | 60 mins Monitoring and Securing Remote and Work-From-Home Environments Eric Schwake, Menlo Security | Jason Clark, Independent Security Researcher | Terry Sweeney, Dark Reading In the wake of COVID-19, many IT departments find themselves managing more remote and work-from-home systems than ever before. What does this mean for... 10 months ago | 62 mins Using Threat Modeling to Improve Enterprise Cyber Defenses John Pironti, IP Architects president | Terry Sweeney, Dark Reading | Yaniv Bar-Dayan, Vulcan Cyber CEO As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. ... 9 months ago | 62 mins Using Threat Modeling to Improve Enterprise Cyber Defenses John Pironti, IP Architects president | Terry Sweeney, Dark Reading | Yaniv Bar-Dayan, Vulcan Cyber CEO As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. ... 8 months ago | 62 mins Dark Reading Interviews Roger Grimes about Data-Driven Defense Terry Sweeney, Dark Reading Contributing Editor and Roger Grimes, KnowBe4's Data-Driven Defense Evangelist Terry Sweeney, a Contributing Editor with Dark Reading, speaks with Roger Grimes, KnowBe4's Data-Driven Defense Evangelist in preparation for Black Ha... 3 years ago | 11 mins Detecting and Stopping Online Attacks Joan Goodchild - Dark Reading ; John Sawyer - IOActive, Inc. ; Dmitriy Ayrapetov - SonicWall Today’s cyber attackers can compromise your systems using a variety of methods, from well-disguised malware to sophisticated, targeted exploits aimed ... 1 year ago | 61 mins Load more