Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Key Components of the Modern API Stack Ahmad Awais, VP of Developer Relations Enterprise API environments have changed. Driven by the explosion of APIs, federation of API programs, and push to the cloud, companies are rethinking... March 30, 2023 3:00pm Securing the new everywhere workplace in a 5G enabled world Jay Bhansali - Sr. Director Product Marketing, Ivanti and Theresa Lanowitz – Director, AT&T Cybersecurity In this new hyper connected world, businesses are using technology to access information faster, enable all new experiences, and build stronger collab... 7 days ago | 37 mins 5 KEY CONSIDERATIONS BEFORE INVESTING IN AN EXTERNAL ATTACK SURFACE MANAGEMENT Tina Thorstenson, VP, Industry Business Unit & Executive Strategist and Kamil Imtiaz, Director, Product Marketing, IT SecOps It’s no secret: your external attack surface is expanding. Digital transformation, remote work, cloud migration and increased reliance on third party ... 3 weeks ago | 44 mins Modelling and Decision-Making in an Ever-Changing World Annie Hou The Causal AI Conference 2022: Modelling and Decision-Making in an Ever-Changing World Annie Hou SVP - Global Head of AI & Behavioural Sciences, MRM ... 3 weeks ago | 32 mins Okta Insights: Building a world where Identity belongs to you Jim Katsos - Senior Manager, Solutions Engineering , Okta Everyone knows the fundamental impact that the consumer and SaaS apps explosion has made in how we live and work. It doesn’t matter if you're in the p... 4 weeks ago | 61 mins 5 KEY CONSIDERATIONS BEFORE INVESTING IN AN EXTERNAL ATTACK SURFACE MANAGEMENT Tina Thorstenson, VP, Industry Business Unit & Executive Strategist and Kamil Imtiaz, Director, Product Marketing, IT SecOps It’s no secret: your external attack surface is expanding. Digital transformation, remote work, cloud migration and increased reliance on third party ... 1 month ago | 44 mins Why You Need an Integrated Technology Approach: Remote Access to File Data Chris Mellor, Blocks & Files; Andres Rodriguez, Nasuni; Jim Liddle, Nasuni Strategies and Technological Approaches for Addressing the Remote Access to File Data Problem, Data Explosion, and Why You Need an Integrated Technolo... May 24, 2023 4:00pm Driving Business Resilience in High-Storage Mainframe Environments John Crossno, Director, Project Management, Rocket Software Businesses are seeing a sharp increase in data production every year, driving an increase in storage budgets. zSystems generate 75% of all enterprise ... 2 months ago | 45 mins Securing access for the modern workforce Mark Guntrip, Sr Director of Cybersecurity Strategy, Menlo Security | John Grady, Senior Analyst, ESG Requirements for access to mission-critical business apps have fundamentally changed in the past few years. Given the explosion of hybrid work and inc... 2 months ago | 57 mins Prioritizing Risk Among the Chaos of Cloud Development Eric Kedrosky, CISO, Sonrai Security and Jeff Moncrief, Field CTO, Sonrai Security Cloud development has enabled amazing innovations and allowed our companies to move faster. It’s also completely broken the old methods for prioritizi... 2 months ago | 48 mins Load more