Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Secure Your Cloud Environment from Evolving Threats Stanislav Sivak, Associate Managing Consultant, Synopsys | Arvinder Saini, Associate Principal Consultant, Synopsys As the migration to the cloud continues at an unabated pace, the threats in the cloud are also increasing proportionally and evolving constantly. Data... 3 weeks ago | 59 mins Cybersecurity Insurance and MFA: What You Need to Know Cole Haney, Darcie Gainer, Jim Salmonson In this webinar, you will learn: What cyber liability insurance is, and why it’s increasingly a necessity for organizations of every size Why multi-f... 3 weeks ago | 58 mins Trends in Cloud Security: Key Findings from the 2022 Thales Cloud Security Study Eric Hanselman, Principal Research Analyst, 451 Research; John McNeice, Research Analyst, 451 Research Businesses across the globe are accelerating the shift to the cloud in a modern digital world where hybrid workforces are accessing data from anywhere... June 23, 2022 2:00pm Documenting the Network - A Critical Part of any Security Process Alanna McLeod, Product Manager, IT Glue Businesses continue to see various challenges since their move to a remote or hybrid work environment. It is no surprise that network security and vis... 3 hours ago | 60 mins Akamai Security Innovation Workshop Q2 2022 Stuart Lodge, Regional Vice President, Akamai Topic for this quarter's Security Innovation Workshop is 5G and Cellular Security Create Enterprise Opportunity for Mobile Network Operators. Cellula... 10 hours ago | 42 mins How to Secure Hybrid Cloud Workloads with GCP Network Connectivity Center Matthew Iakhov, Solution Engineering Manager at Versa Networks Variations in security controls across different clouds multiply the risk of data breaches. Very limited dynamic routing intelligence in a cloud infra... 1 day ago | 59 mins Why Move to Cloud-Managed Network Services Zeus Kerravala and Cricket Liu With businesses becoming more dynamic and distributed, the traditional on-premises management method has become expensive, error-prone and slow. The C... 2 days ago | 45 mins Why Move to Cloud-Managed Network Services Zeus Kerravala and Cricket Liu With businesses becoming more dynamic and distributed, the traditional on-premises management method has become expensive, error-prone and slow. The C... 2 days ago | 45 mins Why Move to Cloud-Managed Network Services Zeus Kerravala and Cricket Liu With businesses becoming more dynamic and distributed, the traditional on-premises management method has become expensive, error-prone and slow. The C... 3 days ago | 45 mins ThreatINSIGHT - Eliminating Adversaries’ Dwell Time Advantage Gigamon ThreatINSIGHT Team For the past decade, we’ve all seen reports that show adversary dwell time exceeding well beyond acceptable ranges (280 days, as reported by IBM). Thi... 1 day ago | 57 mins Load more