Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 2021 OWASP Top 10: Cryptographic Failures - Ep 2 John Wagnon, Solutions Architect, F5 2021 OWASP Top 10: Cryptographic Failures - 02 Cryptographic failures, previously known as "Sensitive Data Exposure", lead to sensitive data exposur... September 21, 2022 9:00am How to protect your data using Application Layer Encryption Kim Christensen 95 percent of data breaches are cause by human errors, and with an average cost of a data breach globally being $3.92 million, it is not only a privac... September 14, 2022 11:00am Simplifying PKI in Hybrid and Multi-Cloud Deployments Murali Palanisamy, Chief Solutions Officer, AppViewX and Derek Amelotte, Solution Engineer, AppViewX Digital Transformation has become synonymous with cloud adoption. As enterprises migrate their existing applications to the cloud and build new cloud-... 1 week ago | 46 mins ETSI Security Week:Industry Applications and Use Cases for Advanced Cryptography François Ambrosini,, Moderator, Scott Cadzow, Dr. Yang Cui, Dr. Jinguang Han The benefits of Advanced Cryptography are recognised by ETSI, as its members make developments and standards in Identity-Based Cryptography, Attribute... 2 years ago | 99 mins The Impact of Post Quantum Cryptography on UEFI BIOS Jiewen Yao and Vincent Zimmer, Intel In order to resist the threat from quantum computers, National Institute of Standard and Technology (NIST) started the Post-Quantum Cryptography (PQC)... 1 year ago | 51 mins Root Causes Episode 128: What is Total Certificate Agility? Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo First we had crypto agility, which is how we ensure our cryptography stays current with the needs of security. Expanding on this concept, industry lea... 1 year ago | 15 mins The Zero Trust Ideal Andy Manoske, Principal Product Manager, Security and Cryptography, HashiCorp As companies move to the cloud, they face challenges with scaling, managing access, and securing connectivity across their infrastructure. At HashiC... 1 year ago | 52 mins Simplifying PKI in Hybrid and Multi-Cloud Deployments Murali Palanisamy, Chief Solutions Officer, AppViewX and Derek Amelotte, Solution Engineer, AppViewX Digital Transformation has become synonymous with cloud adoption. As enterprises migrate their existing applications to the cloud and build new cloud-... 8 months ago | 46 mins Securing Communications at the Tactical Edge using Hardware Security Modules Alex Antrim, Senior Solutions Engineer, Yubico Today’s warfighters and the network architects that design the communications networks that they rely on, are faced with adversaries that are increasi... 2 months ago | 61 mins The Zero Trust Ideal Andy Manoske, Principal Product Manager, Security and Cryptography, HashiCorp As companies move to the cloud, they face challenges with scaling, managing access, and securing connectivity across their infrastructure. At HashiC... 12 months ago | 52 mins Load more