Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Securing the Risky Mobile Workforce Matt Woodruff, Enterprise Security Solutions, Jamf Supporting a mobile workforce will take more than just a standard mobile device management program to mitigate threats and provide effective complianc... 6 months ago | 24 mins Is AI the Panacea to Doing Threat Detection Right? George Anderson - Secureworks, Nash Borges - Secureworks, Rebecca Wynn - Click Solutions Group and Simon Ratcliffe - Ensono The rise of AI has made its way to threat detection. With AI-enabled threat detection systems predicting new attacks and notifying admins of data brea... March 30, 2023 1:00pm Microservices Security Pattern in Kubernetes (East-West Traffic) Chris Nesbitt-Smith, Instructor at Learnk8s Join the experts from Learnk8s and NGINX to learn “How do I secure my APIs and apps to be production-ready?” In this session, you’ll learn about the s... April 10, 2023 9:00am Microservices Security Pattern in Kubernetes (East-West Traffic) Chris Nesbitt-Smith, Instructor at Learnk8s Join the experts from Learnk8s and NGINX to learn “How do I secure my APIs and apps to be production-ready?” In this session, you’ll learn about the s... 3 weeks ago | 64 mins Fall in Love with Your Remote Access Again Linda Park, Sr. Product Marketing Manager, Zscaler & Amy Heng, Product Marketing Manager, Zscaler When was the last time you said you liked your firewall or VPN? Let’s face it, they may be holding you back from finding the truly secure remote acces... 3 weeks ago | 61 mins The First Experience-Driven Network Operations Center: An Inside Look Jeremy Rossbach, Chief Technical Evangelist, Broadcom Despite assumptions to the contrary, application teams aren’t the only ones who should prioritize the user experience (UX)—network operations teams mu... 2 months ago | 17 mins Securing Application Identities in 2023 Five Trends And A Prediction CyberArk "Now that identity reigns as the new perimeter—in which the physical perimeter of working within a corporate office has dissolved and our endpoints, a... 1 month ago | 48 mins F5 Device Upgrade AppViewX F5 BIG-IP devices are a popular choice for companies that want to upgrade their data center architecture. To upgrade multiple BIG-IP environments at o... 3 months ago | 6 mins Microservices Security Pattern in Kubernetes (East-West Traffic) Chris Nesbitt-Smith, Instructor at Learnk8s Join the experts from Learnk8s and NGINX to learn “How do I secure my APIs and apps to be production-ready?” In this session, you’ll learn about the s... 3 months ago | 64 mins Zero trust success stories: Balancing UX with remote security Colin Henderson, VP Information Security, OneTrust and James Chang, Product Marketing Manager, Cloudflare Two years into the global pandemic, and the stakes for remote work security have never been higher. Even as ransomware, phishing, and shadow IT reach... 1 month ago | 32 mins Load more