Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Using Automation to Address Misconfigurations and Cut Costs [APAC] Dhanil Parwani, Senior Partner Solutions Architect-Networking at AWS & Alex Noble, Senior Manager at Rapid7 In modern AWS environments, many struggle to keep up with the risk of misconfigurations. This is due to millions of resources regularly being added ac... 1 month ago | 32 mins Using Automation to Address Misconfigurations and Cut Costs [EMEA] Dhanil Parwani, Senior Partner Solutions Architect-Networking at AWS & Alex Noble, Senior Manager at Rapid7 In modern AWS environments, many struggle to keep up with the risk of misconfigurations. This is due to millions of resources regularly being added ac... 1 month ago | 32 mins Cloud Configuration Security: What Public Cloud Users Need to Know Jyoti Sharma, Product Marketing Manager VMware; Taka Uenishi, Group Product Line Marketing Manager VMware As organizations leverage the speed, flexibility and scale offered by a multi-cloud architecture, complexity grows quickly, making it a challenge for ... 2 weeks ago | 38 mins CISO's Roadmap to Cloud Security: Tackling Threats with Innovative Strategies Nesh (Steven Puddephatt) - Senior Solutions Engineer & Francesco Altomare - Southern Europe Regional Manager @ GlobalDots Today's CISOs face a daunting array of security threats. From ransomware and cloud misconfigurations to zero-day exploits and code vulnerabilities, th... June 15, 2023 12:00pm Beyond Misconfigurations Correlating Threats to Truly Understand Your Cloud Risk Ofer Yarom, Principal Product Manager, Posture Control, Zscaler Today’s attackers leverage sophisticated techniques against their target organizations, using multiple attack vectors to exploit several security weak... 2 months ago | 45 mins Unlocking the Secrets to a Bulletproof Security Posture Eric Anderson, Oren Koren It's time to address the elephant in the room: despite the proliferation of security tools and advanced prevention technologies, data breaches continu... 3 weeks ago | 47 mins How To Overcome Active Directory Exploits And Prevent Attacks Shira Bendkowski - Director of Product Management at XM Cyber According to Gartner, “It is critical to make concentrated efforts to comprehensively secure and monitor Active Directory, proactively look for threat... June 21, 2023 1:00pm Under the Hood: Building and Automating Pipeline Security Giovanni Verrienti, Cloud Security Architect, Check Point Traditional security is not built for CI/CD and right now many organizations are being forced to trade agility for security. During this webinar, you’... 3 weeks ago | 59 mins Qualys 2023 TruRisk Research Report Review Travis Smith, VP - Threat Research Unit, Qualys The Qualys Threat Research Unit (TRU) has curated anonymized data from over 2.3 billion vulnerabilities to provide a uniquely detailed analysis of vul... 3 weeks ago | 37 mins OWASP Top 10: Security misconfiguration Jonathan Knudsen, Head of Global Research Listed at #5 on the OWASP Top 10 list, security misconfiguration refers to vulnerabilities that result from an application’s configuration. In this ... 4 months ago | 3 mins Load more