Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Zero Trust Architecture. Establishing a security blueprint: step by step Dr. Christopher Meyer, Product Manager Utimaco | Dr. Fabian Eidens, Technology Manager Utimaco Zero Trust Architecture. Establishing a security blueprint - step by step, brick by brick: Things to bear in mind when building your Zero Trust Archit... June 7, 2023 8:00am Helping Big Enterprise Mitigate Cyber Risk at Scale [CyberRisk Summit May 2023] Yaniv Bar-Dayan, Vulcan Cyber CEO Watch this CyberRisk Summit keynote from Yaniv Bar-Dayan, Vulcan Cyber CEO, and learn how Vulcan Cyber is helping the world's largest retailers, finan... June 7, 2023 4:00pm The Future of Attacker Automation and AI David Warburton, Director at F5 Labs, the Threat Research Division of F5 and Bryan Glick, Editor in Chief at ComputerWeekly Automation is a growing security problem that most organisations don’t recognise as many have no way of identifying which “users” are real humans and ... June 8, 2023 11:00am Protect Your Apps and APIs to Thrive in a Multi-Cloud World Keiron Shepherd, Senior Solutions Architect - F5 With cloud architectures, protecting both the application business logic and the underlying application infrastructure is paramount. However, as appli... June 8, 2023 9:00am CISO Perspectives on Cyber Security with Limited Resources - CyberRisk Summit Frank Kim, YL Ventures CISO in residence Now more than ever cyber security teams are being asked to do more with less and to get the most out of existing investments in people and tools. Atte... June 14, 2023 4:00pm Why Threat Modeling Is Critical for Enterprise Cyber Defense Jake Williams, Security Researcher & Christopher Cummings, Principal Consultant. Moderated by Becky Bracken from Dark Reading As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. ... June 15, 2023 9:00am Assess Your Vulnerability to OWASP Top 21 Automated Threats using Radware's BVS Krishnakumar Satheesh We invite you to join our upcoming webinar, on how you can leverage the Bad Bot Vulnerability Scanner Assessment to identify your vulnerability to OWA... June 12, 2023 7:00am Assess Your Vulnerability to OWASP Top 21 Automated Threats using Radware's BVS Krishnakumar Satheesh We invite you to join our upcoming webinar, on how you can leverage the Bad Bot Vulnerability Scanner Assessment to identify your vulnerability to OWA... June 12, 2023 12:00pm Schützen Sie Ihr Unternehmen mit cloudnativen Sicherheitsmaßnahmen Kevin Breuer, Enterprise Sales Engineer, LogRhythm, und Olaf Fürstenberg, Country Manager DACH, LogRhythm Um einen vollständigen Einblick in Ihre Daten zu erhalten und Bedrohungen schnell aufzudecken, benötigen Sie eine robuste Lösung für die Protokollverw... June 6, 2023 9:00am Ransomware groups negotiation tactics: what you need to know Marc Rivero, senior security researcher, Global Research and Analysis Team, Kaspersky Cybercriminals tend to be secretive and act without disclosing their identity. However, when it comes to ransomware negotiations, the victim and the a... 3 hours ago | 39 mins Load more