Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Red Teaming Series – EP2 – Red Button, The DDoS Experts Pascal Geenens, Radware | Daniel Smith, Radware | Ziv Gadot, Red Button | Ziv Elyashiv, Red Button In a threat landscape where denial of service is omnipresent, and anyone can become a target, organizations should take a proactive approach to DDoS d... March 22, 2023 8:00am Red Teaming Series – EP2 – Red Button, The DDoS Experts Pascal Geenens, Radware | Daniel Smith, Radware | Ziv Gadot, Red Button | Ziv Elyashiv, Red Button In a threat landscape where denial of service is omnipresent, and anyone can become a target, organizations should take a proactive approach to DDoS d... March 22, 2023 4:00pm Edge computing's impact on today's gaming and trading culture Farhad Mehraban, CEO & Founder | Mehraban Advisory Group LLC In the aftermath of COVID-19 that forced everyone in isolation, working from home became a normality, resulting in high volumes of day trading and eve... 2 weeks ago | 41 mins Beyond Identity: The Pitfalls of Not Becoming Identity Agnostic in 2023 Dan Jaye, Co-Founder & CEO at Aqfer and Daniel Landsman, Global Director of Ad Tech & Gaming at Aerospike Sure, when you first started working with your identity provider, you fell in love with the promise of being able to run more effective and measurable... April 6, 2023 5:00pm Tips to make your company cyber insurable Ralph Villanueva, IT Security and Compliance Analyst | Hilton Grand Vacations The recent rash of ransomware attacks and evolving cyber security threats make cyber security insurance a necessity, both to protect the company and t... 2 months ago | 59 mins How to Implement Zero Trust and API Security Judith Kahrer and Gary Archer, Product Marketing Engineers at Curity APIs and microservices are exposed to multiple threats, including unauthorized access and escalation of privilege. Using a Zero Trust approach with it... 4 weeks ago | 48 mins Regulator Roundtable: regulating in a rapidly evolving world IAGA To remain relevant in today’s rapidly changing, information-intense world, regulators must continually evaluate existing market conditions while consi... 1 month ago | 70 mins Risks of Unsupported Java: How to Use JDK 7 Simon Ritter, Deputy CTO, Azul Simon Ritter discusses the challenges of continuing to use unsupported Java, as well as solutions to ensure the maximum level of both security and sta... 3 months ago | 31 mins Hardening Single Page Application Security Michal Trojanowski, Product Marketing Engineer, Gary Archer Product Marketing Engineer at Curity When it comes to user experience and infrastructure management, Single Page Applications (SPA) are great, but securing them can be difficult. Since SP... 2 months ago | 65 mins How to Implement Zero Trust and API Security Judith Kahrer and Gary Archer, Product Marketing Engineers at Curity APIs and microservices are exposed to multiple threats, including unauthorized access and escalation of privilege. Using a Zero Trust approach with it... 2 months ago | 48 mins Load more