Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Building Boundaries: How to Rein in Cloud Sprawl Alex Hilton - CEO, CIF | Shaun Ward - Claranet | Dan Ortman - SoftwareONE | Adrian Lovell - HPE Cloud infrastructures offer seemingly endless opportunities, but this lack of physical boundaries can create problems if organizations aren’t careful.... 3 days ago | 63 mins How to maintain security in a hybrid work environment Thomas Wingfield, Product Marketing Manager & Molita Sorisho, Product Marketing Mngr & Sanjay Khanna, Product Manager @ Webex Security is paramount today. With people now working from everywhere, your risk surface has expanded. Even if your databases and networks are protecte... 1 day ago | 30 mins Biggest Cybersecurity Challenges of 2022: Are You Prepared? Lisa Forte - Cybersecurity, David Warburton - Threat Research Manager, F5 and Matthieu Dierick - Solutions Architect, F5 Join us for an exclusive myForum event where we explore and debate the most pressing cybersecurity concerns of 2022, and more importantly how organisa... July 5, 2022 9:00am Securing Apps Starts with Securing Kubernetes Mark Boddington Solutions Architect and Philippe Cloup Senior Solutions Architect When an application enters production as a container, it arrives as a changeless artifact. The first few moments of its existence are spent communicat... 3 days ago | 63 mins Diving Deeper into SASE: Part 2 Kevin Beaver, CIISP, Independent Information Security Consultant, Principle Logic LLC A recent report from AT&T found that Private 5G and cloud were cited as the preferred edge network. And yet almost three-quarters (74%) of companies s... 2 days ago | 19 mins Secure SD-WAN: Connect and protect your hybrid work to multicloud applications Steve Harrison, TME Manager, Meraki. Prashant Tripathi Chief Architect SD-WAN, Viptela In a hybrid environment with data everywhere, delivering secure access to applications and data is your most critical challenge. What does it take to ... 1 week ago | 60 mins 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... July 7, 2022 9:00am Dell Technologies on Equinix Metal: Digital Advantage As a Service Mark Bowker, ESG | Tony Nelson, Dell Technologies | Zach Smith, Equinix Ongoing global circumstances from continuous supply chain delays to growing concerns around climate change are forcing organizations to rapidly shift ... 2 days ago | 45 mins TechChannel: How to Incorporate Continuous Testing Into Your IBM i Dev Cycles Andrew Finley Solutions Engineer, Rocket Software Continuous integration and continuous delivery sounds interesting, but it’s not possible without agile, automated testing of your IBM i code. This is ... July 1, 2022 5:00pm Bot Attacks: Top Threats and Trends Nitzan Miron [VP, Product Management, Application Security], Tushar Richabadas [Senior Product Manager, Application Security] How is your business detecting and blocking bad bots that execute web scraping, account takeover, distributed denial of service (DDoS), and other atta... 1 day ago | 44 mins Load more