Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Getting to Know SASE: Part 1 Kevin Beaver, CIISP, Independent Information Security Consultant, Principle Logic LLC As CSO Online explains, “Edge is the concept that moves computing from a centralized model to a decentralized one, away from datacenter consolidation ... 3 days ago | 16 mins The Perfect Storm: The Ransomware 3.0 Explosion and New Risks to Your Data John Burke - CTO, Nemertes | Pete Nourse - CRO & CMO, Asigra and Kevin Johnson, CEO of Secure Ideas Cyber attackers have been enjoying favourable conditions for attacks in recent years. The shift to remote working created huge vulnerabilities within ... July 12, 2022 3:00pm Is a False Sense of API Security Pervasive in the Enterprise? Christopher M. Steffen | Prakash Sinha Modern applications, composed of functions and services, require developers to rely on APIs to communicate between applications and their components t... 3 days ago | 60 mins Getting to Know SASE: Part 1 Kevin Beaver, CIISP, Independent Information Security Consultant, Principle Logic LLC As CSO Online explains, “Edge is the concept that moves computing from a centralized model to a decentralized one, away from datacenter consolidation ... July 19, 2022 12:00pm Enhance Your Users’ Experience, Security, and Productivity from Day 1 Lisa Matragrano, Adarsh Kesari, Taylor Boring Want to know how you can achieve seamless, secure onboarding that balances employee experience, management, and security? Join our expert panel as the... 4 days ago | 44 mins Moving Beyond Traditional App Security Tools Melinda Marks, Senior Analyst, ESG | Jay Coley, Sr. Security Architect, Fastly Traditional application security tools are not solving today’s problems and traditional tools can create more problems than they solve. False positive... 2 weeks ago | 24 mins Supercharging a Seamless & Secure Remote Workforce Mark Jeffries According to Gartner, it is projected that 31% of global workers will be remote in 2022 — and in the U.S., that percentage rises to a staggering 53%. ... 2 months ago | 16 mins One Step Further: How to Prioritise Security with SecDevOps Helen Beal - DevOps Institute | Ricardo Ferreira - Fortinet | Ryan Sheldrake - Lacework | Cheryl Razzell - IFS Security has historically had to be an after-thought for developers. The need for speed and delivery means that misconfigurations and vulnerabilities ... July 18, 2022 3:00pm Securing & Safeguarding User Experience for Hybrid Work and Cloud Transformation Mark Leary of IDC and Paul Kao of Broadcom Software Organizations are seeking new, more efficient ways to deliver secure, flexible solutions to their employees, partners and customers. This often means ... 2 days ago | 55 mins Making Your Workforce Productive and Secure with Application Containment Eugene Yew Users constantly seek ways to bypass organizational internet access control policies for personal use by using VPN software or anonymous proxy applica... July 5, 2022 8:00am Load more