Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 2021 OWASP Top 10: Security Misconfiguration - Ep 5 John Wagnon, Solutions Architect, F5 Security Misconfiguration is a major source of cloud breaches. Learn what to do and avoid—as modern app development, software re-use, and architectura... 2 days ago | 10 mins 5 Ways to Establish Zero Trust in the Cloud with Orca Security and AWS Ty Murphy, Director of Product Marketing at Orca Security & Dudi Matot, Security Segment Lead at AWS Establishing a Zero-Trust program is a critical strategy to help security teams govern security across cloud and on-premise environments. As an AWS So... February 16, 2023 7:00pm Getting to Know the F5 Distributed Cloud Platform - Ep 1 Raffaele D'Albenzio Manager Solutions Engineering, F5 and Bart Salaets Senior Director Solutions Engineering, F5 Experience the look-and-feel and get an understanding of the main concepts and building blocks of the F5 Distributed Cloud Services Platform. This Saa... February 22, 2023 10:00am 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... February 14, 2023 10:00am End of On-Premise WAFs and Need for a New Application Protection Architecture Prakash Sinha In today's digital age, businesses are constantly seeking new ways to innovate and stay competitive. As more companies move to a majority online prese... February 16, 2023 1:00pm End of On-Premise WAFs and Need for a New Application Protection Architecture Prakash Sinha In today's digital age, businesses are constantly seeking new ways to innovate and stay competitive. As more companies move to a majority online prese... February 16, 2023 8:00am Battling Endpoint Cybercrime: Protecting Modern Businesses Nick Cavalancia, Conversational Geek | Kent Feid, Quest Software | Dan Garcia, EDB | Markus Abraham, Independent Consultant The workforce is changing at a rate few can keep up with. The impact of hybrid working, BYOD and IoT can take its toll on your security, open you up t... February 16, 2023 10:00am 2021 OWASP Top 10: Identification and Authentication Failures - Ep7 John Wagnon, Solutions Architect, F5 It is critical to confirm identity and use strong authentication and session management to protect against business logic abuse. Most authentication a... February 21, 2023 10:00am Live now [APAC] Looking Forward: LogRhythm Cybersecurity Predictions 2023 Andrew Hollister, LogRhythm CISO & Kevin Kirkwood, LogRhythm Deputy CISO. With organizations embracing remote work and welcoming digitalization, cybersecurity professionals must stay on top of cyberattack trends and prepare ... February 9, 2023 2:00am | 52 mins Proven defense tactics for amplification DDoS attacks Omer Yoachimik, Product Manager, DDoS Protection Alex Forster, Systems Engineer A new zero-day vulnerability has been discovered that can be exploited to launch disruptive DDoS attacks using UDP amplification. This attack vector i... 2 hours ago | 34 mins Load more