Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Mitigating the Risk of Microsoft 365 Attacks Nick Cavalancia, Max Linscott With over 350 million users of Microsoft 365 that have access to applications and data of interest to cybercriminals, it makes sense that Microsoft’s ... 2 weeks ago | 61 mins Signposts on the Road to Data Eutopia; Avoiding the Traffic Jams Bryan Glick, Editor in Chief, Computer Weekly; Mark Semenenko, Director Solutions Engineering, Immuta There are many reasons why companies have not been successful in realising their often ambitious strategies for data, Yet the one that often emerges a... 4 weeks ago | 11 mins 6 Must-Have Microsoft 365 Security Configurations Every Admin Needs to Know Paul Schnackenburg, author of the M365 Security Checklist and Andy Syrewicze, Microsoft MVP Microsoft 365 is now a key platform for a vast number of businesses. And yet Microsoft 365 default security settings are just not enough to prevent at... 3 months ago | 64 mins Augmenting Native Email Infrastructure Security Cheryl Tang, Sr. Director of Product Marketing at Proofpoint & Jess Burn, Senior Analyst at Forrester Research As more organizations adopt cloud collaboration platforms, they’re also turning to native security capabilities provided by cloud email providers. How... 2 months ago | 50 mins A CISO Discussion: Don't "Default" on Email Security Ed Harris, CISO Mauser Packaging and Mike Bailey, Manager of Product Marketing Proofpoint With an increase in sophisticated phishing attacks like supplier fraud, ransomware threats, and account compromise attempts, default email security ca... 9 months ago | 32 mins Responsible Compliance for Cloud Security Manik Garg, Compliance Product Owner, Adobe When moving to the cloud, people often rely on their cloud service provider (CSP) for security and other baseline configurations, assuming that the cl... 2 months ago | 22 mins The Future of Innovation: Changing the Mindset Nadja Gabbert & Simon Ratcliffe, Ensono When we speak of innovation we invariably default to conversations about technology and how and where it can change our organisations, but true innova... 2 months ago | 48 mins Aqua Cloud Native Security JumpStart: Kubernetes Security Iheanyi Njeze, Solutions Architect According to the Cloud Native Computing Foundation’s annual survey, Kubernetes use in production has increased to 83%, up from 78% the year before. ... 6 months ago | 29 mins Aqua Cloud Native Security: The Path to Runtime Security Iheanyi Njeze, Solutions Architect Runtime exploitation is a risky business. Malicious actors have developed sophisticated techniques to evade static scans by hiding malware in images a... 6 months ago | 34 mins What's New in the Venafi Platform 21.3 Release Diane Garey, Product Marketing Manager, Venafi Protecting against next-gen attacks to machine identities requires solutions that are robust and hardened. In this webinar, we'll highlight several ne... 1 year ago | 59 mins Load more