Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 2021 OWASP Top 10: Identification and Authentication Failures - Ep7 John Wagnon, Solutions Architect, F5 It is critical to confirm identity and use strong authentication and session management to protect against business logic abuse. Most authentication a... July 14, 2022 9:00am Secure your enterprise with multi-factor authentication for your Salesforce Sai Ranjan, Regional Manager, Thales & Nilesh Ghorpade, IAM Principal Consultant, Persistent Cyberattacks are on the rise and passwords no longer provide sufficient safeguard against unauthorised access to the Salesforce data. The cybersecurit... 3 months ago | 44 mins Stop Account Takeovers with Phishing-Resistant MFA Karen Larson, Sr. Director, Strategic Alliance, Axiad; Derek Hanson, VP Solutions Architecture and Product Evangelist, Yubico Cyberattacks were the fifth top rated risk in 2020, and they continue to grow in 2022 with 91% of all cyberattacks beginning with a phishing email. En... 3 days ago | 39 mins Raus aus dem Bermuda-Dreieck der Cyberbedrohungen Marco Di Filippo, Gerald Beuchelt, Daniel Holzinger, Peter van Zeist, Dr. Oliver Janzen Die Zahl der Cyberangriffe wächst und wächst: Allein 2021 wurden 146.343 Cybercrime Straftaten registriert, 2022 werden es mehr! Dazu kommt: Der poten... July 5, 2022 8:00am Duo Q&A Roundtable Seema Kathuria, Product Marketing Manager;Ganesh Umapathy, Product Marketing Manager;Ted Kietzman, Product Marketing Manager You ask. We’ll answer! Do you have questions related to Duo? Things like: What’s new in the world of MFA? What is security resilience and how does th... 2 days ago | 50 mins AD Attack Paths: How Object-level Permissions Lead to Inadvertent Access Jeff Warren, GM-Products, Stealthbits now part of Netwrix The overwhelming majority of organizations worldwide leverage Active Directory (AD) as their central hub of authentication and authorization. It liter... 1 week ago | 31 mins The Pesky Password Problem: Policies That Help You Gain the Upper Hand Roger Grimes (KnowBe4), David Littman (Truth In IT) What really makes a “strong” password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease... 2 weeks ago | 59 mins 3 Modern Active Directory Attack Scenarios and How to Detect Them Randy Franklin Smith( CEO, Monterey Technology Group, Inc.), Jeff Warren (SVP, Products) The threat landscape is ever-changing and, in this deeply technical webinar, Microsoft MVP Randy Franklin Smith and STEALTHbits SVP Jeff Warren show y... July 13, 2022 5:00pm Who’s In Control: Human or Machine? Lei Chen, Marcus by Goldman Sachs, Gagan Sekhon, MoneyLion, Neha Wattas, JPMorgan Chase, Ashish Jain, Arkose Labs As finance becomes more digital and real-time, protecting their digital platforms is becoming increasingly challenging as attackers adapt their approa... July 6, 2022 5:00pm Can We Go Passwordless in 2022? Diana Kelley, Cybrize | Richard Meeus, Akamai | Peter Newton, Fortinet Gartner predicts that 60% of large enterprises will implement passwordless methods by the end of the year. Going passwordless reduces the risk of pass... July 20, 2022 4:00pm Load more