Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to leverage full cloud adoption in payments Darren Busby (MYHSM Global Head Sales) | Sudhir Kalidindi (AWS Principal Solutions Architect) | Suresh Vaghjiani (CLOWD9 CEO) Digital transformation and the global growth of electronic payments forges ahead with unprecedented momentum, but this growth potential does not guara... 2 days ago | 58 mins What you see, you understand. Total network visibility in the palm of your hand John Burke - Nemertes, Marc Wheeler - Cisco, Sander Barens - Expereo and Nick Cavalancia - Conversational Geek In this series we have covered Global Internet Connectivity for the enterprise, and ensuring the Internet is tamed for the business environment. But t... March 30, 2023 9:00am Securing Your Site: Setting up TLS in Varnish Thijs Feryn, Technical Evangelist, Varnish Software Transport Layer Security, TLS, is a standard security protocol for establishing an encrypted link between a server and a client. TLS allows sensitive ... April 4, 2023 3:00pm Container Security Essentials David Benas, Associate Principal Consultant, Synopsys As the popularity of cloud-native applications continues to surge, containers are becoming the preferred option to package and deploy these applicatio... 2 weeks ago | 61 mins Red Teaming Series – EP2 – Red Button, The DDoS Experts Pascal Geenens, Radware | Daniel Smith, Radware | Ziv Gadot, Red Button | Ziv Elyashiv, Red Button In a threat landscape where denial of service is omnipresent, and anyone can become a target, organizations should take a proactive approach to DDoS d... 3 days ago | 45 mins Red Teaming Series – EP2 – Red Button, The DDoS Experts Pascal Geenens, Radware | Daniel Smith, Radware | Ziv Gadot, Red Button | Ziv Elyashiv, Red Button In a threat landscape where denial of service is omnipresent, and anyone can become a target, organizations should take a proactive approach to DDoS d... 3 days ago | 45 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 1 week ago | 38 mins Kubernetes Backup as a Service Webinar Tom Leyden, VP Marketing, Kasten by Veeam From infrastructure to backup, MSPs deliver best in class technology to help clients succeed. With 7.1 million cloud native developers worldwide, the... 2 weeks ago | 55 mins End-to-end orchestrated patching for CISA compliance Will Tome, Automation Strategist, Red Hat "As long as there is software, there will be patching. Now more than ever, security vulnerabilities left unpatched put agencies at significant risk. T... 18 hours ago | 32 mins Take Control of Your Cloud Data Security Terry Ray, SVP, Data Security GTM, Imperva & Author Richard Stiennon of IT Harvest Take Control of Your Cloud Data Security: Best Practices for Proactive Protection in Any Cloud Service Looking to secure your cloud data but don't kn... 2 days ago | 60 mins Load more