Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Take Control of Your Cloud Data Security Terry Ray, SVP, Data Security GTM, Imperva & Author Richard Stiennon of IT Harvest Take Control of Your Cloud Data Security: Best Practices for Proactive Protection in Any Cloud Service Looking to secure your cloud data but don't kn... 15 hours ago | 60 mins Maximizing Business Results with Modernized Cloud Strategies Zones Hybrid cloud strategies is a direction modern organizations are leveraging. Providing distributed cloud strategies is used to optimized business outpu... 2 days ago | 31 mins Protecting Your Applications and APIs with Modern Ingress Security Frank Yue, Senior Product Marketing Manager Application architectures are evolving, and security needs to evolve with it. Web application and API protection is critical in today’s multi-cloud an... 1 week ago | 56 mins Decentralising WAAPaaS with Customer Edge - Ep 6 Philippe Cloup, Senior Solutions Architect, F5 and Patrick Zoller, Security Solutions Architect, F5 Learn how you can deploy and consume F5 Distributed Cloud Services closer to your apps, either on premises or in private and public clouds, by leverag... March 29, 2023 9:00am Protecting Your Applications and APIs with Modern Ingress Security Frank Yue, Senior Product Marketing Manager Application architectures are evolving, and security needs to evolve with it. Web application and API protection is critical in today’s multi-cloud an... 1 week ago | 56 mins Securing the Modern Application Framework Chas Lesley, Solutions Architect, F5 | Michael Sullivan, Solutions Engineer II, F5 As modern applications grow more complex with multi-cloud environments, it becomes more challenging to deliver security and gain access to an applicat... 1 week ago | 62 mins Disrupt the Ransomware Threat Actors: Focus on Attack Chains Mark Harris,Cybersecurity Advisor & Brette Peterson, Prod Mkt Mngr Proofpoint; Brandon Dunlap, Moderator Ransomware continues to dominate the headlines with a wide range of organizations impacted. Part of its staying power is that ransomware threat actors... March 28, 2023 5:00pm How to Prevent Attacks that Bypass MFA Nick Biasini, Head of Outreach for Cisco Talos and Ganesh Umapathy, Duo Product Marketing Manager Implementing Multi-Factor authentication (MFA) is one of the most effective ways to reduce the risk of a data breach. The popularity of cloud-based se... March 28, 2023 5:00pm Unlock the Benefits of Your Multi-Cloud Strategy with a Cloud Operating Model Stephen Elliot, Group VP, I&O, DevOps and Cloud Operations, IDC; Purnima Padmanabham, SVP & GM, Cloud Management, VMware To reap the benefits of a multi-cloud strategy, you must create a cloud operating model to organize line of business and IT processes for fast collabo... 1 month ago | 52 mins A three prong approach to avoiding shadow IT in a world of Hybrid Work Sean Donahue, Senior Solutions Marketing Manager, Nutanix Does balancing what users want with what your organization needs have you feeling like a circus juggler? Gone are the days of providing a beige box un... 2 weeks ago | 35 mins Load more