Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Cybersecurity Insurance and MFA: What You Need to Know Cole Haney, Darcie Gainer, Jim Salmonson In this webinar, you will learn: What cyber liability insurance is, and why it’s increasingly a necessity for organizations of every size Why multi-f... 3 weeks ago | 58 mins Protect Kubernetes Apps from SQL Injection Jenn Gile, Senior Manager of Product Marketing, NGINX You work in IT for a popular local store that sells a variety of goods, from pillows to bicycles. They're about to launch their first online store, bu... September 15, 2022 9:00am Is your organization ready for DORA? Here's what you need to know Nuno Almeida Silva - Consulting Engineer EMEA; João Faria - Field Marketing Manager Announced as part of the new digital finance strategy, the Digital Operational Resilience Act (DORA), initiated by the European Union (EU), is harmoni... May 18, 2022 9:00am Glance Features to Know: Making Human Connections in the Digital World Jill Newberg, Director of Product Marketing at Glance, Matt Wheeler, Sales Engineer at Glance Whether you’re new to Glance or a long-time customer, the latest features offer new ways for you to connect, share, and secure personalized, guided cu... May 18, 2022 3:00pm Captivate Your Target Audience with an All-Around Customer Identity Experience Christine Garvey, Sandeep Kumbhat, Andy March, Payal Pan Great customer experiences are no longer just nice to have, they’re a key differentiator between you and your competitors. Consumers seek brands that ... May 19, 2022 9:00am Upgrade Your Identity Management: Minimize Risk and Leverage Cloud Opportunities John Morton - Britive, Dr. Chase Cunningham - Ericom Software and Sameer Patwardhan - Forbes We know identity is the new perimeter in the cloud. But what does that mean, and how does it affect business security? It means identities – human a... May 19, 2022 5:00pm Learn How to Find Security Threats Before Hackers Find Them For You Keith Bromley, Keysight Technologies | Scott Register, Keysight Technologies | David Batty, Trellix Please join us for a replay of this webinar. Every network has a security vulnerability. Vulnerabilities obviously lead to threats. Do you know where... May 18, 2022 4:00pm Stop the Apache Log4J Vulnerability and Prevent Future Attacks With Zero Trust Deepen Desai, CISO & VP Security Research Zscaler & Rick Miles, Senior Director of Product Management at Zscaler A devastating vulnerability was recently discovered in the popular Apache Log4j Java logging library that allows attackers to execute code remotely. I... 7 hours ago | 58 mins Open-source supply chain on Azure | Microsoft OSS series Aaron Whitehouse, Public Cloud GTM Alliances Director, Canonical There has been a Cambrian explosion in open source. We have moved from Linux as a hobby project to it powering aroud half of Public Cloud workloads. F... May 18, 2022 10:30am Ransomware Refresh: What You Need to Know Neil Jones, Dir, Cybersecurity Evangelism, Egnyte and Salil Sane, Sr. Director PM, Egnyte Ransomware tactics are constantly evolving. When it comes to cyber attacks, it is not a matter of if, but when. Being prepared for the inevitable is a... 1 week ago | 26 mins Load more