Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How can a shared security approach help ensure that your security is watertight? Danna Bethlehem, Director IAM Product Management - Access Management and Authentication You’d be forgiven for thinking that, as the major cloud providers have massive security teams, you can strike ‘security’ off your list of things to wo... 1 week ago | 36 mins What do Conti leaks mean for defenders? Dan Petrillo Product Marketing Director; Eliad Kimhy, Security Products; Stiv Kupchik Cyber Security Analyst - AKAMAI Akamai Security Researchers have reviewed and analyzed the leaked Conti group’s internal documentation to understand the tools and techniques used by ... June 29, 2022 2:00pm Fast Track Your Cyber Insurance Initiatives With Identity Protection Narendran Vaideeswaran (CrowdStrike), Paul Byrne (CrowdStrike), Kelly Butler (Marsh Specialty) Modern attacks like ransomware have been around for quite some time. According to the 2021 CrowdStrike Global Security Attitude Survey, 66% of organiz... 2 days ago | 81 mins Introduction to confidential computing on public clouds with Ubuntu Chris Huffman - VP of Public Sector, Ijlal Loutfi - Security Product Manager Public clouds are great! Yet, many users are still reluctant towards moving their security-sensitive workloads away from their private data centers an... 4 weeks ago | 47 mins Research Findings: 1 in 7 Ransomware Extortion Attacks Leak Critical OT Data Daniel Kapellman Zafra, Manager Mandiant Threat Intelligence The increase in ransomware and multifaceted extortion in 2021 resulted in a surprising risk to Operational Technology. A new study by Mandiant Threat ... 3 months ago | 52 mins Protecting organization data against cyber attacks, threats and data breaches Glen D. Singh, Cybersecurity Author and Trainer Tune into this session to learn about the importance of identifying and protecting various types of assets within organizations and how using a multi-... 1 month ago | 45 mins How can a shared security approach help ensure that your security is watertight? Danna Bethlehem, Director IAM Product Management - Access Management and Authentication You’d be forgiven for thinking that, as the major cloud providers have massive security teams, you can strike ‘security’ off your list of things to wo... 1 month ago | 36 mins Security’s Three-Ring Circus: Cloud, Supply Chain, and Staff Ed Adams, Security Innovation | Renee Guttman | Vik Desai, Accenture | Stan Black 2022 kicks off on the heels of Log4j and other soft spots of our technology underbelly. These warts on our security playbooks highlight the importance... 1 month ago | 57 mins The Top Data Leaks, Cyberattacks, and Insider Hacks of 2021 (and 2022 Outlook) James E. Lee, COO, Identity Theft Resource Center and Dihan Rosenburg, Senior Product Marketing Manager. Spirion Cyber breaches reached an all-time high in 2021. No matter what industry you operate in, last year’s expansive breaches left wide-ranging impacts on o... 5 months ago | 59 mins 3 Steps to Protect Cloud Data in the Wake of the Pfizer Data Leak Hank Schless and Mahesh Rachakonda, Lookout We often associate breaches with corporate espionage and advanced threat groups, but as the Pfizer IP leak incident showed, cloud connectivity has act... 5 months ago | 37 mins Load more