Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 5 Considerations for a Smooth Replacement of NetScaler Yaron Azerual Citrix recently announced that they’ll soon turn their focus away from you and most customers anddevote all of their resources to their top 1600 custo... March 30, 2023 3:00pm Protect Your Business From Data Privacy Leaks Using Automated Security Testing James Croall, Product Management Director, Synopsys Join us for a webinar on the automated source code data protection measure with James Croall, Product Management Director, Synopsys. James will discus... 4 weeks ago | 39 mins Sustainability in Hardware Provisioning and Why It Matters Wendy Zhang, Michael Barnes, Sören Enholm, Kimberly Liew Is your organization doing enough to build sustainable initiatives, particularly when it comes to purchasing sustainable hardware? Learn from our ama... 7 days ago | 30 mins Simplifying Cloud Security - A SANS Review of Forcepoint ONE Matt Bromiley, SANS Analyst | Mike Schuricht, VP, Products, Forcepoint Join SANS instructor Matt Bromiley and Mike Schuricht, VP of Product Management from Forcepoint, for an in-depth review of the Forcepoint ONE Security... 3 weeks ago | 60 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 2 weeks ago | 37 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 2 weeks ago | 38 mins How Do I Use JWTs Safely? The Do's and Don'ts Ira Cherkes Levinshteyn, Senior Software Engineer JSON web tokens (JWTs) are widely used in authentication processes to transfer information in a JSON format while ensuring data integrity. However, ju... 3 weeks ago | 28 mins How to Turn Customer Feedback into Action (APAC) Product Manager Melanie Fox, Alchemer Mobile *This is a webinar replay, recorded when Alchemer Mobile was known as Apptentive. We will not be taking live questions. Please submit queries to Marke... March 29, 2023 12:00am Case study: Data protection trends and ransomware defense in the real world Cristophe Bertrand | Colm Keegan | Saurabh Sensharma | Rob Petrone Data continues to grow in scale and importance for companies of all shapes and sizes. As it does, so too does the imperative to protect it. Threat act... 5 hours ago | 50 mins Why Adopt a CDP? Assessing the Past, Present, and Future Data Climate Matt Parisi, Director, Product Marketing, Tealium Your CDP Preparation Masterclass Series Ep 1 Customer Data Platforms (CDPs) have become increasingly popular over the last few years and rightfully s... 9 hours ago | 41 mins Load more