Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Introducing Tricentis Test Automation for Salesforce John Lange, Julian Ho To realize the full value of their Salesforce instances, companies need a testing solution that can handle the complexities of Salesforce and be used ... 3 days ago | 28 mins Dismantling Ransomware with Unified Endpoint Management Nick Cavalancia, Conversational Geek | Kent Feid, Quest Software In 2022, on average, there was a ransomware attack every 11 seconds (CyberSecurity Ventures). Given the risk environment, it’s important to stay ahead... February 14, 2023 10:00am Getting to Know the F5 Distributed Cloud Platform - Ep 1 Raffaele D'Albenzio Manager Solutions Engineering, F5 and Bart Salaets Senior Director Solutions Engineering, F5 Experience the look-and-feel and get an understanding of the main concepts and building blocks of the F5 Distributed Cloud Services Platform. This Saa... February 22, 2023 10:00am A new approach for browser-based performance testing Bryan Cole To effectively verify performance under load, your performance testing strategy should include both protocol and browser-based testing. But traditiona... 2 weeks ago | 14 mins Applying the Easy Button for API Security - Ep 3 Matthieu Dierick, Solutions Architect, F5 and Mohamed Shaath, Solutions Architect, F5 Gain insights into how F5 Distributed Cloud Services can help you integrate security into the API development lifecycle, ensuring your SecOps-governed... March 8, 2023 10:00am 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... February 14, 2023 10:00am 2021 OWASP Top 10: Identification and Authentication Failures - Ep7 John Wagnon, Solutions Architect, F5 It is critical to confirm identity and use strong authentication and session management to protect against business logic abuse. Most authentication a... February 21, 2023 10:00am Crisis & Escalation of the Threat Landscape Pascal Geenenes & Daniel Smith Cybersecurity threats continue to evolve and become more sophisticated with a focus on ransomware, targeting of cloud infrastructure and social engine... February 28, 2023 8:00am Finding the balance between security and your customer’s digital experience Jim Katsos, Manager Solutions Engineering, Okta Whether your business is just getting started or well on its way, your online presence will play a vital role in how customers experience your busines... February 7, 2023 1:00am ITAM Past, Present, and Future Pt. 6: Future focus of ITAM Adam Smith-Cairns, product marketing manager, IT Asset Management, ServiceNow We’ll explore the past, present, and future of ITAM, what ITAM will look like in 5-7 years, the future of cloud technologies, who you’ll need to align... February 7, 2023 4:00pm Load more