Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Session 2: Protect Your Apps and APIs across a Distributed Cloud Richard Bible, F5 Senior Solutions Engineer With cloud architectures, protecting both the application business logic and the underlying infrastructure is paramount. With the F5 Distributed Cloud... 2 days ago | 32 mins Protect Your Apps and APIs to Thrive in a Multi-Cloud World Keiron Shepherd, Senior Solutions Architect - F5 With cloud architectures, protecting both the application business logic and the underlying application infrastructure is paramount. However, as appli... June 8, 2023 9:00am Zero Trust Architecture. Establishing a security blueprint: step by step Dr. Christopher Meyer, Product Manager Utimaco | Dr. Fabian Eidens, Technology Manager Utimaco Zero Trust Architecture. Establishing a security blueprint - step by step, brick by brick: Things to bear in mind when building your Zero Trust Archit... June 7, 2023 8:00am Session 1: Protect Your Apps and APIs across a Distributed Cloud Matthieu Dierick, F5 Senior Solutions Architect With cloud architectures, protecting both the application business logic and the underlying application infrastructure is paramount. With the F5 Distr... 1 week ago | 52 mins The Future of Attacker Automation and AI David Warburton, Director at F5 Labs, the Threat Research Division of F5 and Bryan Glick, Editor in Chief at ComputerWeekly Automation is a growing security problem that most organisations don’t recognise as many have no way of identifying which “users” are real humans and ... June 8, 2023 11:00am The Future of Attacker Automation & AI David Warburton, Director at F5 Labs | Brian McKenna, EMEA Regional Director, Analyst Services, ESG Automation is a growing security problem that most organisations don’t recognise as many have no way of identifying which “users” are real humans and ... June 21, 2023 1:00pm Lab: Subdomain Takeover, Part 2 | Discover & remediate Carlos Vendramini, Security Research Engineer, Normalyze In the second part of this two-part webinar, Carlos will do a hands-on demonstration of a subdomain takeover attack using open-source tools. This demo... 3 hours ago | 39 mins Under the Hood: A Deep Dive into the Next Evolution of Risk Management Alfred Trevino - Cloud Security Architect Are you interested in learning how to effectively manage risks in your cloud environment? Join us for a Check Mates webinar on leveraging the Cloud Na... 5 hours ago | 56 mins Securing Apache Spark Big Data Operations Rob Gibbon – Product Manager, and Massimiliano Gori – Senior Information Security Lead A holistic approach to securing Spark-based data engineering: Apache Spark is an open source toolkit that helps users develop parallel, distributed d... 4 hours ago | 43 mins APIs & Hybrid Architectures: Modernize at your own pace - Ep 3 Google Learn how customers are leveraging API management platform, Apigee, to develop API led modernization strategies that enable applications to be to be d... 10 hours ago | 16 mins Load more