Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Without Correlation, Your AppSec Testing Approach Needs an Update Stephen Gates, Application Security Expert at Checkmarx Unlike monolithic applications of the past, where coding was all in the same language, an average cloud-native application can have anything from 50-5... 9 hours ago | 39 mins Raising the Bar on Email Security Neil Hammet, Director, Proofpoint & Ed Rowley Director, Proofpoint The attackers have made it clear who they’re after: Your people. According to the 2021 Verizon Data Breach Investigations Report, 85% of breaches invo... 2 weeks ago | 27 mins Moving Beyond Traditional App Security Tools Melinda Marks, Senior Analyst, ESG | Jay Coley, Sr. Security Architect, Fastly Traditional application security tools are not solving today’s problems and traditional tools can create more problems than they solve. False positive... September 7, 2022 1:00pm How to Protect Your Digital Business Rafe Pilling, Senior Security Researcher, Counter Threat Unit; Emma Jones, Proactive Incident Response Consultant How to Protect Your Digital Business: 3 Top Success Factors to Securing Your Digital Workforce Watch our webinar to discover the impact digital trans... 3 weeks ago | 64 mins Building Boundaries: How to Rein in Cloud Sprawl Alex Hilton - CEO, CIF | Shaun Ward - Claranet | Dan Ortman - SoftwareONE | Adrian Lovell - HPE Cloud infrastructures offer seemingly endless opportunities, but this lack of physical boundaries can create problems if organizations aren’t careful.... 2 months ago | 63 mins Securing Chaos: Data-Driven Workload Protection for Today’s Cloud Challenges Steven Puddephatt, Senior Solutions Engineer at GlobalDots Securing today's complex public cloud environments is really a data problem. While Cloud Workload Protection has greatly evolved over the last few yea... 3 months ago | 55 mins A CISO Discussion: Don't "Default" on Email Security Ed Harris, CISO Mauser Packaging and Mike Bailey, Manager of Product Marketing Proofpoint With an increase in sophisticated phishing attacks like supplier fraud, ransomware threats, and account compromise attempts, default email security ca... 3 months ago | 32 mins The Cybersecurity Skills Shortage: Why, How, and What To Do About It Dan Lohrmann, Presidio | Earl Duby Ignite InfoSec According to The Life and Times of Cybersecurity Professionals 2021 report by the Information Security Systems Association, the ongoing cybersecurity ... November 15, 2022 4:00pm What Made Camino Financial's Customer Service Go Way Up | Dialpad Dialpad and Camino Financial Camino Financial was in a bind. Their business phone system was disorganized and barely had any features—not to mention it couldn’t even integrate wi... 10 hours ago | 62 mins Cloud Application Authentication and Access Control Vulnerabilities Fred Pinkett, Sr. Director Product Management | Brandon Cooper, Solutions Engineer, Security Innovation Join us as we dive deep into three common vulnerabilities found in the cloud: * Improper identify & access management - It's harder than you think! *... 11 hours ago | 22 mins Load more