Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Orchestrating Secure User Login with Authentication Actions Michal Trojanowski, Product Marketing Engineer at Curity and Gary Archer, Product Marketing Engineer at Curity Identity and access management (IAM) aims to give digital entities the right access to the right resources at the right time. One challenge is to iden... 3 weeks ago | 51 mins An Engineer’s Guide to Signature Algorithms and EdDSA Judith Kahrer, Product Marketing Engineer, Daniel Lindau, Identity Specialist, Mark Dobrinic, Software Engineer, at Curity A Zero-Trust Architecture is a token based architecture. The security of a token based architecture is as strong as its tokens. In the end, the securi... 3 weeks ago | 1 min A New Data Frontier: The Value of Streaming Analytics to a Data-first Business Mike Leone - Enterprise Strategy Group, Conor Twomey - KX & Kiran Singh - NextEra Energy When it comes to business initiatives driving technology spend, 1 in 3 organizations state that their top initiative over the next 12 months is to imp... 4 months ago | 35 mins Financial Grade APIs Using OAuth & OpenID Connect Travis Spencer, CEO at Curity Financial-grade security is important not only for the financial sector. This level of security is also necessary for other industries, such as health... 3 weeks ago | 33 mins Green Computing at Scale Shesha Krishnapura, Intel Fellow and Intel IT CTO, Intel®; Michael Schulman, Moderator, Supermicro Learn about the steps you can take to reduce power consumption in your data center, which reduces both the OpEx and the environmental impact of your d... 3 months ago | 35 mins Frictionless Transformation Strategy: Revitalizing Retail Through Integration Alex Hilton, Cloud Industry Forum; Tam Ayers, Digibee; Alan Boehme, H&M Consumers have quickly adapted their retail expectations in the last few years, with a recent RetailNext report reporting that “seamless” is one of th... February 2, 2023 5:00pm Introducción a la Optimización con RISKOptimizer: la Asignación de Cartera Rafael Hartke Introducción a la Optimización con Evolver y RISKOptimizer: Comparación de la Asignación de Cartera con Supuestos Deterministas Versus Estocásticos L... February 2, 2023 3:00pm What is Data Management - an Introduction and Reminder Sue Geuens Data Management covers a multitude of capabilities with tentacles in all parts of the organisation. Implementing “good” Data Management is exceptional... 6 days ago | 47 mins NextGen or LostGen – The need to develop new client acquisition strategies Octo members This panel discussion with Octo Members host Lee Robertson discusses the theme Nextgen or Lostgen and the need to develop new client acquisition strat... 7 days ago | 59 mins Cyber-Physical Converged Threats & Trends in the Energy Industry Martin Strasburger, VP, CISO, Duke Energy Corporation, Ted Bailey, Founder and CEO, Dataminr Learn about converged cyber-physical security strategies that energy organisation can leverage to reduce risk and increase business resiliency. 2 weeks ago | 59 mins Load more