Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Orchestrating Secure User Login with Authentication Actions Michal Trojanowski, Product Marketing Engineer at Curity and Gary Archer, Product Marketing Engineer at Curity Identity and access management (IAM) aims to give digital entities the right access to the right resources at the right time. One challenge is to iden... 3 weeks ago | 51 mins An Engineer’s Guide to Signature Algorithms and EdDSA Judith Kahrer, Product Marketing Engineer, Daniel Lindau, Identity Specialist, Mark Dobrinic, Software Engineer, at Curity A Zero-Trust Architecture is a token based architecture. The security of a token based architecture is as strong as its tokens. In the end, the securi... 3 weeks ago | 1 min Augmenting Identity Security with CBA—Even with an Existing IAM System in Place Geoff Cairns, Principal Analyst @ Forrester Research; Bassam Al-Khalidi, Co-CEO @ Axiad Certificate-based authentication (CBA) is fast becoming the preferred approach for authentication with organizations that are looking for a more-secur... 2 days ago | 50 mins The Changing Authorization Space – A Fireside Chat on Dynamic Authorization Mickey Martin, Director of Product Outreach - PlainID & Nicholas Hunt, Director IAM Delivery - IDMWORKS In this webinar, we’ll have an open discussion with Director of IAM Delivery from IDMWORKS, Nick Hunt, and Director of Product Outreach from PlainID, ... February 1, 2023 5:00pm Making Sense of Zero Trust Josh Green - Duo Technical Marketing Engineer While the concept of zero-trust networking is nearly a decade old, the last few years have seen its popularity in industry discussions grow exponentia... 2 days ago | 36 mins The Role of Authorization in Driving Zero Trust and Identity-First Security Mickey Martin, Director of Product Outreach, PlainID Static and inflexible policies through traditional access control methods have failed to address security risk in real-time. Enterprises are expanding... 1 week ago | 45 mins Building a Business Case for Identity Governance Andrew Silberman, Director, Product Marketing, Omada, and guest speaker Geoff Cairns, Principal Analyst at Forrester Research Identity is now at the forefront of many organizations’ approaches to cybersecurity. However, attempts at solving all the problems that arise from dig... 3 weeks ago | 45 mins Why should you apply a Zero Trust approach to your organisation? Emeka Okoye, Tech Sales Consultant, Entrust Zero Trust is no longer a buzzword or a future-state security goal. We live in a world where people, employees and customers move seamlessly between p... 2 weeks ago | 47 mins Prioritizing Risk Among the Chaos of Cloud Development Eric Kedrosky, CISO, Sonrai Security and Jeff Moncrief, Field CTO, Sonrai Security Cloud development has enabled amazing innovations and allowed our companies to move faster. It’s also completely broken the old methods for prioritizi... 1 week ago | 48 mins Windows 10 & Active Directory Security Best Practices for Preventing Ransomware Jeremy Moskowitz (CTO and Founder of PolicyPak, now part of Netwrix) According to the Department of Homeland Security, more than 4,000 ransomware attacks have occurred daily since January 1, 2016. Moreover, the Departme... 1 week ago | 68 mins Load more