Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Take Action: Putting Open Source Risk Management Policies to Work Aditi Sharma, Dell; Patricia Tarro, Dell; Mike Phillips, Dell & Anthony Decicco, GTC Law Group Once you have a grasp on how open source can both benefit and introduce risk to your organization, your next consideration should be learning to manag... February 2, 2023 9:00am Varnish Configuration Language (VCL), the language that powers Varnish Cache Thijs Feryn, Tech Evangelist, Varnish Software Varnish is the world's most powerful and flexible HTTP cache that is used to accelerate more than 10 million websites globally. A big part of its attr... February 21, 2023 4:00pm Securing the Risky Mobile Workforce Matt Woodruff, Enterprise Security Solutions, Jamf Supporting a mobile workforce will take more than just a standard mobile device management program to mitigate threats and provide effective complianc... 4 months ago | 24 mins Get Smart about Smartphone Cyber Security Jenny Radcliffe - Social Engineer, David McClelland -Technology Reporter, Robert O'Brien - CEO MetaCompliance Our smartphones are always an arm’s length away, but how aware are we of the security risks they pose? Smartphones are a portal into our increasingly... 2 days ago | 46 mins Overcoming the security challenges of Hybrid Cloud Applications John Grady, ESG; John Oh, Palo Alto Networks Cloud adoption continues to grow as organizations execute their digital strategies to compete. A recent ESG report validates cloud adoption and found ... 2 days ago | 46 mins AI vs Ransomware: Before, During and After Zach Atya, Director of Insurance at Measured Insurance | Adam Mansour, Chief Security Officer at ActZero Join cybersecurity experts from two AI-powered organizations, Adam Mansour of ActZero.ai and Zach Atya of Measured Insurance, as they discuss the impl... 2 days ago | 60 mins Address Current Public Key Infrastructure (PKI) Challenges in DevOps Asif Karel, Director of Product Management, AppViewX Public Key Infrastructure (PKI) is used by the DevOps team to ensure authentication and encryption throughout the CI/CD pipeline development process. ... 3 days ago | 50 mins Making Sense of Zero Trust Josh Green - Duo Technical Marketing Engineer While the concept of zero-trust networking is nearly a decade old, the last few years have seen its popularity in industry discussions grow exponentia... 2 days ago | 36 mins Navigating the Impacts of Your Security Performance on Cyber Insurance Gregory Keshian, SVP & GM of Security Performance at BitSight, and Aaron Aanenson, Cyber Insurance Thought Leader at BitSight The state of cybersecurity feels volatile. Despite massive worldwide spending on risk management to the tune of $150 billion, cyber attacks keep happe... 2 days ago | 72 mins Zero-Trust for Multi-Cloud Data Protection Juan Asenjo, Director of Products & Partner Mktg, Entrust As organizations migrate to multi-cloud environments to manage workloads in a more flexible and cost-effective manner, the number of credentials used ... 2 days ago | 27 mins Load more