Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date DevSecOps Explained Meera Rao, Senior Director, Synopsys DevSecOps is a trending practice in application security that involves introducing security earlier in the software development life cycle. It expands... March 30, 2023 6:00pm Take Action: Putting Open Source Risk Management Policies to Work Aditi Sharma, Dell; Patricia Tarro, Dell; Mike Phillips, Dell & Anthony Decicco, GTC Law Group Once you have a grasp on how open source can both benefit and introduce risk to your organization, your next consideration should be learning to manag... 2 weeks ago | 51 mins See Forcepoint ONE Zero Trust Network Access (ZTNA) in Action Nate Springer, Director of Platform Engineering, Forcepoint | Corey Kiesewetter, Sr. Product Marketing Manager, Forcepoint Easy access to private applications without the risks and costs of a VPN Forcepoint ONE Zero Trust Network Access (ZTNA) makes remote access to priv... April 5, 2023 8:00am Varnish Configuration Language 101: Basic Controls, Use Cases, & Benefits Thijs Feryn, Tech Evangelist, Varnish Software Having a full-blown programming language to describe the configuration of your cache gives you unparalleled flexibility to tune the behavior of the ca... 1 month ago | 29 mins Current Vs Future State of Passwordless Lloyd Evans An effective cybersecurity posture requires strong defences around password security. Yet often, password security can be an Achilles' heel in an ente... 6 months ago | 44 mins Securing the Risky Mobile Workforce Matt Woodruff, Enterprise Security Solutions, Jamf Supporting a mobile workforce will take more than just a standard mobile device management program to mitigate threats and provide effective complianc... 6 months ago | 24 mins Level Up Your Cyber Security Training with Netflix Style E-Learning Jake Moore - Global Cyber Security Advisor ESET, David McClelland, Technology Reporter, Robert O'Brien - CEO MetaCompliance. 83% of organisations fail to deliver cyber security training that engages employees. Employee engagement determines the success or failure of a cyber... March 30, 2023 2:00pm How To Protect Your DNS With A Real PDNS Implementation Paul Mockapetris, Chief Scientist at ThreatSTOP When it comes to implementing security for your systems, of course there are shortcuts you can take. But should you? Watch this video below as Paul wa... 10 hours ago | 3 mins 5 Enterprise Kubernetes Trends Adam Bergh, Solutions Architect & Cloud Native Technical Partnerships, Kasten by Veeam; Matt Bator, Produc Adopting Kubernetes and running the platform to its fullest potential can be a bumpy road, but it doesn't have to be. Join Adam and Matt who will shar... 7 hours ago | 49 mins The 2023 State of Data Collection Jai Davda, CIO, FormAssembly | Tomer Madori, GM of IT & Digital Solutions, TechUnity How do security-conscious organizations handle the collecting and processing of their data? What are the challenges of data collection in today’s data... 5 hours ago | 44 mins Load more