Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Secured 3rd party collaboration…Why is it the need of the hour? Seclore As organizations are increasingly collaborating with partners, there is a significant increase of sensitive information residing outside of said organ... 1 month ago | 135 mins Zero Trust - Now is the Time, and PBAC is Key Gal Helemski, Martin Kuppinger Joint webinar for KuppingerCole and PlainID Now is the time to implement the Zero Trust security model because the traditional model of enforcing secu... 6 months ago | 59 mins Root Causes Episode 143: The Four Pillars of Certificate Automation Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo In this episode our hosts explain the Four Pillars of Certificate Automation: deploy, discover, revoke/replace, and renew. They detail what these pill... 1 year ago | 28 mins Securing Multi-Cloud Environments: DIY Privilege Access Management Doesn't Work Dr. Chase Cunningham, John Morton, & Ian Cumming Organizations using multi-cloud environments recognize the need for Just-In-Time, Least Privilege, and Zero Standing Privileges. But achieving such a ... 11 months ago | 57 mins Secured 3rd party collaboration…Why is it the need of the hour? Seclore As organizations are increasingly collaborating with partners, there is a significant increase of sensitive information residing outside of said organ... 11 months ago | 135 mins The key implementations for customer identity management Bryan Glick, Editor-in-Chief at Computer Weekly, and Max Faun, Head of EMEA Consulting at Okta Identity and access management (IAM) is becoming an increasingly important part of an effective cybersecurity setup – enabling organizations to provis... 1 year ago | 13 mins Deep Dive: How to Reduce the Exposure of Your Critical Data Bob Cordisco, Solutions Engineer at Netwrix To reduce the overexposure of regulated and mission-critical data, it’s not enough to understand where it resides; you also need to uncover any issues... 12 months ago | 31 mins Bridging the Gap between Physical & Digital Identity Samy Kamkar, Brooke Lierman, James Segil The separation of physical and digital worlds leaves IT systems vulnerable to physical security breaches; today’s world requires a more holistic appro... 11 months ago | 36 mins Secured 3rd party collaboration…Why is it the need of the hour? Seclore As organizations are increasingly collaborating with partners, there is a significant increase of sensitive information residing outside of said organ... 11 months ago | 135 mins Vulnerability or Compromise: How Long Would It Take You to Remediate? Mark Sanders, Sr. Solution Architect, Venafi In this session we will describe why certificate and key-based machine identity remediation can be such a challenge. We will discuss examples of when... 3 years ago | 38 mins