Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date A New Way with CBA: Bringing Phishing-resistant Authentication to Mobile Scott Truger, Partner Integrations Manager @ Axiad and Shakeel Aziz, Solutions Engineer @ Yubico Certificate-based authentication (CBA) has been a staple of governments and high security environments for decades, and remains a favorite amongst sec... March 30, 2023 4:00pm Next Generation Browser Security & Governance for Enterprises Tony Palmer, ESG; Ilan Yeshua, Seraphic; Alon Levin, Seraphic Browser security is becoming a hot topic in 2022! The digital transformation of corporate operations has introduced employees to all kinds of innova... 4 months ago | 43 mins Next Generation Browser Security & Governance for Enterprises Tony Palmer, ESG; Ilan Yeshua, Seraphic; Alon Levin, Seraphic Browser security is becoming a hot topic in 2022! The digital transformation of corporate operations has introduced employees to all kinds of innova... 5 months ago | 43 mins Aim for Zero Trust Security with All-in-One Cloud Solution High Wire Networks CEO Mark Porter & CTO David Barton and ZTEdge Inventor/CPO "JP" John Peterson With the rising risk of remote "anywhere" work, network firewalls and VPNs won't keep the bad guys out. Imagine a Cloud Area Network that integrates y... 1 year ago | 50 mins Who’s using a Cloud Browser today? YOU’D BE SURPRISED. John Klassen, Product Marketing, Authentic8 Whether for threat intelligence, handling sensitive data, or providing safe and anonymous access to the public web, a Cloud Browser lets you outsource... 4 years ago | 10 mins Your Browser Betrays You Mark Sarbiewski and John Klassen Many believe your browser betrays you. Few have asked themselves: What is the cost of running a “free” local web browser in your organization? Can I... 4 years ago | 45 mins Extending the Zero Trust Framework to Unmanaged Devices Chase Cunningham, Forrester Research, Inc. & Ramesh Rajagopal, Authentic8 Co-Founder & President Remote workers need to reach your applications from anywhere, on any device. How do you enable access while also safeguarding the delivery and interac... 3 years ago | 61 mins Exposing Software Supply Chain Security Blind Spots Michael Sampson, Senior Analyst, Osterman Research; Vince Arneja, Chief Product Officer, GrammaTech Research highlights hidden vulnerabilities in commonly used commercial off-the-shelf software applications Commercial off-the-shelf (COTS) software i... 2 years ago | 51 mins Tech Tip: Secure, Zero-footprint Host Access Barbara Ballard, Scott Vitkus and Que Mangus, Micro Focus For mainframe organizations, modernization and security are top priorities. Moving desktop applications to browser-based products is a key opportunity... 2 years ago | 57 mins Transactional Analytics Delivers Greater Visibility With End-to-End Monitoring Eric Odell, Dan Iuster, Dana Gilboa Poor application performance and crashes cost millions of dollars to businesses globally. Yet, recent surveys show that only 26% of application teams... 7 years ago | 61 mins Load more