Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Taking Zero Trust to 100%: Best Practices to Support your Journey Alexandra Willsher, Forcepoint | John Leonard, Computing | Anne Cockshott, The Channel Company EMEA Zero Trust is widely regarded as the best approach for protecting organizations, but implementing it is a journey rather than a one-off purchase. The... 2 months ago | 38 mins Simplifying Cloud Security - A SANS Review of Forcepoint ONE Matt Bromiley, SANS Analyst | Mike Schuricht, VP, Products, Forcepoint Join SANS instructor Matt Bromiley and Mike Schuricht, VP of Product Management from Forcepoint, for an in-depth review of the Forcepoint ONE Security... 3 months ago | 60 mins Ep 7 - Integrating WAF into DevSecOps Practices Andrew Cheng Senior Solutions Engineer - F5 and Patrick Zoller Security Solutions Architect - F5 The fact that application attacks are on the rise is a growing concern for business leaders, as applications are the gateway to an organisation's most... 18 hours ago | 74 mins Red Hat Ansible Automation for applications and services Tricia McConnell, Principal Product Marketing Manager, Ansible Automation Middleware serves a key function within many businesses. However, managing these resources at cloud scale to serve new opportunities and business use ... 2 days ago | 54 mins Can DNS Security Block Phishing? Paul Mockapetris, Chief Scientist at ThreatSTOP Phishing is a serious threat faced by all businesses and individuals. It may seem as though there is no way to stop phishing scams, but DNS security c... 2 days ago | 2 mins Can DNS Security Block Ransomware? Paul Mockapetris, Chief Scientist at ThreatSTOP Any device that reaches the Internet is susceptible to ransomware from the web. DNS security is used to block ransomware and keep your devices safe. W... June 7, 2023 5:00pm Why You Need an Integrated Technology Approach: Remote Access to File Data Chris Mellor, Blocks & Files; Andres Rodriguez, Nasuni; Jim Liddle, Nasuni Strategies and Technological Approaches for Addressing the Remote Access to File Data Problem, Data Explosion, and Why You Need an Integrated Technolo... 1 week ago | 49 mins Prioritizing SSE to Protect the Modern Digital Business John Grady - Senior Analyst, Enterprise Strategy Group & Doug Browne, Director for Cloud Security & SSE, APJC - Cisco Systems Current IT environments and the reality of modern business practices have left organizations with no choice but to consider new security models. The n... June 8, 2023 5:00am Enhance your Microsoft 365 security with Cloudflare Zero Trust Alex Dunbrack, Product Management, Cloudflare | Dominic Yip, Solutions Engineering, Cloudflare As a go-to productivity suite for many businesses, Microsoft 365 delivers excellent native security defenses to help teams collaborate and communicate... 1 week ago | 35 mins Get Started with NGINX Fundamentals of Microservices Owen Garrett Sr. Director, Product Management, NGINX Are you feeling mystified by the world of microservices, despite their widespread use in some of the most popular apps on the planet? You're not alone... 1 week ago | 60 mins Load more