Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Protect Your Apps and APIs to Thrive in a Multi-Cloud World Keiron Shepherd, Senior Solutions Architect - F5 With cloud architectures, protecting both the application business logic and the underlying application infrastructure is paramount. However, as appli... June 8, 2023 9:00am Session 2: Protect Your Apps and APIs across a Distributed Cloud Richard Bible, F5 Senior Solutions Engineer With cloud architectures, protecting both the application business logic and the underlying infrastructure is paramount. With the F5 Distributed Cloud... 6 days ago | 32 mins Session 1: Protect Your Apps and APIs across a Distributed Cloud Matthieu Dierick, F5 Senior Solutions Architect With cloud architectures, protecting both the application business logic and the underlying application infrastructure is paramount. With the F5 Distr... 2 weeks ago | 52 mins DLP SaaS Security with Forcepoint ONE DLP Justin Crowley, Principal Enablement Manager | Kevin Oliveira, Snr. Product Marketing Manager, Data Security Solutions Secure all your cloud data with ONE DLP Forcepoint ONE DLP delivers best-in-class, SaaS security across cloud, web and private applications. Now you ... 2 months ago | 52 mins Automotive Cybersecurity: Device Tamper Protection & Secure Over-the-air Updates Priyank Kumar, Senior Director IoT and Payments Utimaco | Alois Kliner VP Automotive and IoT Manufacturing Utimaco Security risks do not commence when the production of the automobile is finalized; they begin at the point of manufacture, where individual components... 6 months ago | 61 mins See Forcepoint ONE Zero Trust Network Access (ZTNA) in Action Nate Springer, Director of Platform Engineering, Forcepoint | Corey Kiesewetter, Sr. Product Marketing Manager, Forcepoint Easy access to private applications without the risks and costs of a VPN Forcepoint ONE Zero Trust Network Access (ZTNA) makes remote access to priv... 2 months ago | 36 mins 5 Steps to Simplifying Zero Trust with SASE Corey Kiesewetter, Sr. Product Marketing Manager, Forcepoint Join Corey Kiesewetter as he discusses the benefits of a single-vendor SASE solution and how the CASB, ZTNA, SWG, DLP and Secure SD-WAN components can... 5 months ago | 23 mins IIoT cybersecurity threats: how to run complete protection at gateway level Sekou Roland Sako, Security Researcher at ICS CERT Kaspersky and Andrey Sazonov, Project manager at Aprotech Today Industry 4.0 is transforming from a concept to an everyday reality. Industrial internet of things (IIoT) is a key contributor to this evolution.... 3 days ago | 38 mins Naviguer en toute sécurité dans les eaux troubles des cybermenaces Pierre-François Guglielmi, CTO chez Rubrik Avec l’adoption croissante des solutions cloud, il devient urgent de garantir la disponibilité des données d’entreprise critiques en cas de cyberattaq... June 7, 2023 8:00am Ransomware Protection: Across the Attack Surface and Along the Kill Chain David Finger, VP, Product & Solutions, Fortinet and Aamir Lakhani, Senior Offensive Attack Researcher, Fortinet For ransomware operators to successfully encrypt data they first need to deliver code to target devices. In order to find those devices, attackers rel... 5 days ago | 34 mins Load more