Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 2021 OWASP Top 10: Security Logging and Monitoring Failures - Ep 9 John Wagnon, Solutions Architect, F5 Without properly logging and monitoring app activities, breaches cannot be detected. Not doing so directly impacts visibility, incident alerting, and ... March 7, 2023 10:00am How to Simplify Workplace App Collections with Endpoint Inspector Ashley Hernandez - VP of Product with Cellebrite Enterprise Solutions Cloud based workplace applications are growing in popularity among employees and are drastically changing how companies communicate internally. Where... 2 weeks ago | 35 mins How to Manage Permissions with Cloud Infrastructure and Entitlement Management Alfred Trevino, Cloud Technical Marketing Manager In this webinar we will see how using CIEM helps customers move closer to zero trust for permissions which in turn makes a much more secure environmen... February 14, 2023 5:00pm How to Minimise the Risk from Privileged Activity [Netwrix SbPAM Demo] Michael Dawkins, Solutions Engineer at Netwrix A single misuse of a privileged account, whether negligent or malicious, can lead to costly business disruptions and data breaches. Want to dramatical... February 28, 2023 10:00am To Kube or not to Kube: When should you use DIY Kubernetes? Paul Whiten, Cloud Services Advocate, Red Hat; Manoj Alaghappan Senior Cloud Services Black Belt, Red Hat Thinking of building your own Kubernetes platform as part of your cloud strategy? How will you manage upgrades, third-party integrations, security, an... 4 weeks ago | 59 mins Setting yourself up for success - Logging and Monitoring Barnaby Skeggs, Principal Consultant, Mandiant • How did they gain access to our environment? • How long have we been compromised? • Did they steal any data? These same questions are asked of eve... 4 months ago | 61 mins Frictionless and secure customer experience- Identity for Consumer Apps & SaaS Bill Lazos, Senior Solution Engineer, Okta As a business leader, you’re tasked with getting your digital products to market in as short a time as possible, increasing customer registration and ... 2 months ago | 99 mins Top 10 Dos and Dont's When Caching Your Website Thijs Feryn, Technical Evangelist, Varnish Software | Arianna Aondio, Senior Engineer, Varnish Software Whether you’re using Varnish Cache to speed up your own website or deploying Varnish Enterprise on a large scale streaming operation, this webinar wil... 2 months ago | 78 mins Juggling OMB Compliance and Logging Costs Amidst Threats Desi Gavis-Hughson, Sr. Solutions Marketing Manager In today’s ever-changing threat environment, U.S. federal agencies face the daunting task of building effective cybersecurity practices optimized for ... 5 months ago | 23 mins How to Mitigate the OWASP Top 10 Risks: Part 3 Sean Flynn, Director of Security Technology and Strategy and Rob Higgins, Principal Technical Account Manager The Open Web Application Security Project or OWASP is a nonprofit organization that works to improve the security of software. The organization produc... 2 months ago | 31 mins Load more