Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date AI-powered Classification and Protection for Efficient Enterprise DLP Alin Mutu, Director of Product Management and Chris Muffat, VP of Data Classification The growth and dispersion of data in the cloud makes protecting sensitive information more challenging than ever. Legacy Data Loss Prevention (DLP) so... 17 hours ago | 32 mins Build Resistance to Attacks by Unlocking the Value of Ethical Hackers Sean Ryan, Sr. Principal, Product Marketing Manager Attack surfaces are expanding, spurred on by the continuous release of new digital services and business transformation. In this session, you will lea... 1 day ago | 34 mins Without Correlation, Your AppSec Testing Approach Needs an Update Stephen Gates, Application Security Expert at Checkmarx Unlike monolithic applications of the past, where coding was all in the same language, an average cloud-native application can have anything from 50-5... 7 hours ago | 39 mins Driving Security Resilience in an Ever-Changing World Ankur Chadda - Leader, Product Marketing, Cisco We all know that avoiding cyberattacks one hundred percent of the time is unrealistic. Our networks have become too complex and dispersed to catch eve... 2 days ago | 36 mins Don’t Put the Cart Before the Horse: What Do I Do to Manage Risk? [EMEA] Mike Kaplan Security vendors and industry analysts continuously come up with a dizzying array of product categories, acronyms, and buzzwords. Hear from Rapid7’s S... 15 hours ago | 9 mins Cross-cloud security controls: impossible dream or new frontier? Pali Surdhar, Director of Product Security, Entrust & Dale McKay, Senior Technical Marketing Architect, VMware The journey to the next generation of cloud-based deployments has created a “virtual” nightmare of tools, technologies, complexities, and vulnerabilit... August 24, 2022 3:00pm How to Implement Vulnerability Management with Runecast Steve Salisbury (Product Marketing Specialist) & Steve Bettison (Technical Sales Engineer) As the complexity of software and therefore their vulnerabilities increase, so does the need for better vulnerability management. Regular automated sc... August 25, 2022 9:00am How to Protect Your Applications in the Multi-Cloud Eyal Arazi Most organizations today deploy applications across three, four or five different cloud environments, meaning they frequently must use multiple applic... 7 days ago | 31 mins Linux: How to Defend the New Cyberattack Frontier Nir Givol, Senior Product Manager at Morphisec; Bill Reed, Director of Product Marketing at Morphisec Supply chain, data theft, spyware, ransomware, and other malicious attacks against Linux servers have increased by over 35 percent in 2021, especially... 6 hours ago | 64 mins Best Practices to Maximize Application Intelligence Srudi Dineshan, Senior Product Marketing Manager - Gigamon + Sujay Pathakji, Head of IT Operations - Axiom Telecom Originally aired on an iSMG webcast. At a time when applications are more business-critical than ever - and visibility is more challenging to achieve... 7 hours ago | 20 mins Load more