Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How Do I Use JWTs Safely? The Do's and Don'ts Ira Cherkes Levinshteyn, Senior Software Engineer JSON web tokens (JWTs) are widely used in authentication processes to transfer information in a JSON format while ensuring data integrity. However, ju... 1 week ago | 28 mins How to Mitigate Risk and Improve Operations with a Network Digital Twin GigaOm analyst, Howard Holton and Forward Networks VP of product and UX, Chiara Regale GigaOm analyst, Howard Holton and Forward Networks VP of product and UX, Chiara Regale will discuss how enterprises can use digital twin technology. T... 2 days ago | 49 mins Tom & Jeremy Show: Episode 8: Photomosaics and the Bigger Picture Tom Gricks, Sr. Principal Consultant, Recon Investigations & Dr. Jeremy Pickens, Chief Data Scientist, Conga Tune in to engage in a 30-minute interactive webinar-style discussion with renowned eDiscovery and data science experts from OpenText, Tom Gricks, Sr.... 3 days ago | 52 mins Live Demo - Ransomware - January 24th Arien Seghetti, Solutions Architect As ransomware mutates into more sophisticated forms, cybersecurity defenses must evolve with it or leave companies exposed. With an estimated 4 thous... 4 days ago | 31 mins Live Demo - Lateral Movement: Breaking Down & Identifying Terry Jenvey, Director of Sales Engineering EMEA In this Live Demo will be breaking down the subject of lateral movement and help identify what it looks like for the organization. Lateral movement i... February 7, 2023 4:00pm Webinar - Five Questions to Ask as You Deploy Security Posture Management Dave Klein, Cybersecurity Evangelist Director and Dr. Ed Amoroso, CEO & Founder of TAG Cyber, LLC. Join our panel of industry experts as they share insights into five key questions that need to be asked by enterprise teams as they deploy security po... 1 month ago | 41 mins Live Demo - Vulnerability Prioritization: are you exposed? - February 21st Arien Seghetti, Solutions Architect Regardless of the amount of efforts and resources invested, organizations never seem to be closing the gap between the number of existing and emerging... February 21, 2023 4:00pm How to Build a DevOps Supply Chain on Zero-Trust Principles ESG Sr. Analyst, Melinda Marks; Check Point Security Engineer Lead, Bisham Kishnani & Developer Security Lead, Dotan Nahum Over the past decade, the concept of Zero Trust has become a fundamental part of cybersecurity architecture. In fact, the concept of Zero Trust is beh... February 23, 2023 4:00pm Use Network Query Engine to turn network data into significant savings Andreas Voellmy Principal Engineer, Yadhu Govindarajan, Director of Customer Success Join to learn how global enterprises are using data to extract business value from their network. Dr. Andreas Voellmy, our principal engineer, develop... February 2, 2023 4:00pm Operationalise Threat Intelligence: Pivoting & Validating Yan Hua Lim, Senior Systems Engineer, APAC 1. How do you translate the data on hand into actionable threat intelligence ? 2. Are you able to gauge the effectiveness of your cyber security con... 1 month ago | 36 mins Load more