Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Securing Kubernetes at Scale: Deploying Uncrackable Clusters Keith Mokris, VP of Cloud Security Evangelism, Orca Security and Jacob Graves, Security Engineer, Orca Security Enterprises and cloud native organizations around the world have gravitated towards Kubernetes for powering their applications and tech stacks. Why? K... 1 day ago | 52 mins Are SIEM Solutions enough? Ryan Alban, Senior Manager of Global Solution Leads - George Anderson, Senior Manager of Product Marketing Choose the right SecOps platform to spend and defend effectively. What You’ll Learn: • The differences between SIEM and XDR and how they both impact... September 7, 2022 1:00pm Securing Kubernetes at Scale: Deploying Uncrackable Clusters Keith Mokris, VP of Cloud Security Evangelism, Orca Security and Jacob Graves, Security Engineer, Orca Security Enterprises and cloud native organizations around the world have gravitated towards Kubernetes for powering their applications and tech stacks. Why? K... 4 weeks ago | 52 mins The Art of Zero Touch Deployments Jim Grandbois, Partner Marketing, Jamf The bygone days of imaging have made way for zero-touch deployments, empowering IT to successfully deploy Mac, iPad and iPhone to users directly witho... 1 month ago | 27 mins Managed Penetration Testing - An Integral Part of Your Risk Management Approach Aravind Venkataraman, Senior Principal Consultant and David Johansson, Principal Consultant, Synopsys Managed penetration testing is an integral part of an organization’s risk management strategy. It serves as a complementary security testing approach ... 2 months ago | 47 mins Work Smarter, Not Harder: Standardizing Device Lifecycle Management Curtis Armstrong, Field Engineer, Jamf Let's be honest. IT admins face unexpected challenges like onboarding new and experienced teachers, introducing new technology, or distributing studen... 2 months ago | 22 mins Apple Enterprise Management for Beginners Kaylee Carlson, Product Marketing Manager Apple, Microsoft and Google all have unique workflows, and no one tool meets the needs of each ecosystem. Which means IT and security teams need a uni... 2 months ago | 27 mins Cracking the Code of DevSecOps Dave Gruber, Senior Analyst, Enterprise Strategy Group and Patrick Carey, Director Product Marketing, Synopsys Digital transformation initiatives are forcing development teams to make tough decisions. They have to make tradeoffs between feature velocity and man... 4 months ago | 59 mins Live now Antivirus For Amazon S3 Workshop: Malware Scanning For Application Workflows Ed Casmer, Founder & CTO, Cloud Storage Security // Gokhul Srinivasan, Sr. Partner Solutions Architect, Amazon Web Services Because of Amazon S3’s flexibility and performance, a growing number of organizations use it as the object store for files uploaded by application use... August 16, 2022 3:00pm | 180 mins Simplify identity verification with the Real Identity Platform Tey Peryie, Jorge Montiel, Sarah Munro, Mihir Parikh and David Vilf from Onfido Identity verification is complicated. Constantly changing global regulation, heightened user expectations and evolving fraud can make effective verifi... 2 hours ago | 59 mins Load more